Results 31 to 40 of about 350,338 (191)

A Practical Attack on the MIFARE Classic [PDF]

open access: yes, 2008
The MIFARE Classic is the most widely used contactless smart card in the market. Its design and implementation details are kept secret by its manufacturer.
Gans, Gerhard de Koning   +2 more
core   +3 more sources

A Deterministic Methodology Using Smart Card Data for Prediction of Ridership on Public Transport

open access: yesApplied Sciences, 2022
In the present study, we propose a methodology that predicts the number of passengers on new public transport lines based on smart card data and an optimal path finding algorithm.
Minhyuck Lee, Inwoo Jeon, Chulmin Jun
doaj   +1 more source

A Novel Consumer-Centric Card Management Architecture and Potential Security Issues [PDF]

open access: yes, 2015
International audienceMulti-application smart card technology has gained momentum due to the Near Field Communication (NFC) and smart phone revolution.
Akram   +23 more
core   +4 more sources

SISTEM TERPADU REKAM MEDIK RUMAH SAKIT DENGAN SMART CARD

open access: yesJurnal Informatika, 2012
Dalam penelitian ini, system terpadu rekam medik rumah sakit dibuat dengan teknologi smart card sebagai media penimpanan data Tujuan dari penelitian ini adalah menerapkan teknologi smart card sebagai sarana atau media penyimpan informasi pasien yang ...
_ Sukamto, Wahyu Sulistyo, Budi Suyanto
doaj   +1 more source

What role for smart-card data from bus systems? [PDF]

open access: yes, 2004
This paper examines whether data, generated from smart cards used for bus travel, can be put forward as a replacement for, or a complement to, existing transport data sources.
Bagchi, M.   +3 more
core   +2 more sources

A Remote User Authentication Scheme with Anonymity for Mobile Devices

open access: yesInternational Journal of Advanced Robotic Systems, 2012
With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure
Soobok Shin   +3 more
doaj   +1 more source

Ecosystems of Trusted Execution Environment on smartphones - a potentially bumpy road [PDF]

open access: yes, 2017
The advent of smartphones and the flexibility to have multiple applications serving the user's needs, has started a convergence of different services into a single device.
Akram, Raja Naeem   +3 more
core   +1 more source

RANCANG BANGUN APLIKASI SMART CARD INTERFACE

open access: yesLontar Komputer, 2012
Opportunity to development smart card -based application is quite large as the need for smart card technology in various fields of both business and government agencies and BUMN. One brand that is widely used smart card is a smart card type from a vendor
I Putu Agus Swastika   +2 more
doaj  

Miniatur Access Control Ruang Kuliah dengan Menggunakan Smart Card [PDF]

open access: yes, 2010
Pada penelitian ini dibuat suatu alat berupa miniatur access control ruang kuliah dengan menggunakan smart card. Alat ini yang diharapkan mampu membatasi access control pada ruang kuliah terdiri atas: smart card socket, mikrokontroler, SD card, LCD ...
Tjan, J. (Jane), Wibowo, A. (Antonius)
core  

S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard [PDF]

open access: yes, 2017
Nowadays, mobile banking becomes a popular tool which consumers can conduct financial transactions such as shopping, monitoring accounts balance, transferring funds and other payments.
Putra, Dea Saka Kurnia   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy