Results 41 to 50 of about 350,338 (191)

Authentication scheme for multi-cloud environment based on smart card

open access: yesTongxin xuebao, 2018
To solve the problem of the access keys stored in a smart card increasing linearly with the number of registered clouds without third party participated in authentication,an authentication scheme was proposed for multi-cloud environment based on smart ...
Sen ZHAO   +3 more
doaj   +2 more sources

Heap . . . Hop! Heap Is Also Vulnerable [PDF]

open access: yes, 2014
International audienceSeveral logical attacks against Java based smart card have been published recently. Most of them are based on the hypothesis that the type verification was not performed, thus allowing to obtain dynamically a type confusion.
Bouffard, Guillaume   +3 more
core   +3 more sources

RADIO FREQUENCY IDENTIFICATION (RFID) SMART CARD ON PARKING SYSTEM AS E-BUSINESS PROSPECT [PDF]

open access: yesJournal of Engineering Science and Technology, 2018
This research aims at presenting how RFID Smart Card technology developed in parking system as e-business prospect. The measured indicators are stakeholders' satisfaction.
EDDY SOERYANTO SOEGOTO
doaj  

Electoral Malpractice and Card Reader System in Nigeria: A Study of the 2019 Presidential Election

open access: yesPolish Political Science Yearbook, 2023
The adoption of smart card technology in various parts of Africa has reduced electoral malpractices, resulting in election credibility and acceptability. However, its use in Nigeria’s electoral process is believed to have downsides.
Habeeb Abidoye Sheu   +1 more
doaj   +1 more source

A Study on Users' Perception Towards Cash Card Usage in UPM [PDF]

open access: yes, 2001
One of the most important significance in the emergence of e-commerce is the development of electronic payment system. This system replaces physical banknote and coins and substitutes them with electronic cash or digital cash.
Ismail, Maizatul Akmar
core  

Secure Method Invocation in JASON [PDF]

open access: yes, 2002
We describe the Secure Method Invocation (SMI) framework implemented for Jason, our Javacard As Secure Objects Networks platform. Jason realises the secure object store paradigm, that reconciles the card-as-storage-element and card-as-processing-element ...
Brinkman, Richard, Hoepman, Jaap-Henk
core   +4 more sources

ANALISIS DAN PERANCANGAN SISTEM SELF SERVICE COPY AND PRINT BERBASISKAN TEKNOLOGI SMART CARD [PDF]

open access: yes, 2010
ANALISIS DAN PERANCANGAN SISTEM SELF SERVICE COPY AND PRINT BERBASISKAN TEKNOLOGI SMART CARD - Jasa kios pencetakan, Pencetak, Self Service Copy and Print, Smart Card, media penyimpanan eksternal, proses ...
KARTIKA CANDRA, BINA   +2 more
core  

Who uses smart card? Understanding public transport payment preference in developing contexts, a case study of Manila's LRT-1

open access: yesIATSS Research, 2019
The culture of “tingi-tingi” or sachet economy provides a strong backdrop to better understand the payment mode preference of the riding public in the Philippines.
Ying Lu   +2 more
doaj   +1 more source

Electromagnetic Immunity Performance of Intelligent Electronic Equipment in Smart Substation’s Electromagnetic Environment

open access: yesEnergies, 2020
With the gradual increasing of the transmission voltage level, the situation of interference on secondary side equipment in smart substations is becoming more serious.
Guanchen Liu   +5 more
doaj   +1 more source

Smart cards aren't always the smart choice [PDF]

open access: yesComputer, 1999
Smart cards are beneficial in some scenarios, but they are not the security panacea that some people believe them to be. In some user environments, the costs and inconveniences clearly outweigh the potential benefits of using smart cards.
openaire   +1 more source

Home - About - Disclaimer - Privacy