Results 1 to 10 of about 62,486 (134)

INVESTIGATION OF JAVA SMART CARD TECHNOLOGYFOR MULTI-TASK APPLICATIONS [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2008
The objective of this work is to build a number of different secure applets for Java smart card were each applet is designed for a specific task. Three packages were designed; the first package is the “Secure Wallet” which represents the electronic money
Sinan G. Abid Ali   +2 more
doaj   +1 more source

Getting to know your Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit [PDF]

open access: yes, 2015
Smart-cards are considered to be one of the most secure, tamper-resistant, and trusted devices for implementing confidential operations, such as authentication, key management, encryption and decryption for financial, communication, security and data management purposes.
Gkaniatsou, Andriana   +5 more
openaire   +1 more source

Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol [PDF]

open access: yes, 2014
The Protocol for Lightweight Authentication of Identity (PLAID) aims at secure and private authentication between a smart card and a terminal. Originally developed by a unit of the Australian Department of Human Services for physical and logical access ...
C. Brzuska   +12 more
core   +2 more sources

Multi-agent framework based on smart sensors/actuators for machine tools control and monitoring [PDF]

open access: yes, 2006
Throughout the history, the evolutions of the requirements for manufacturing equipments have depended on the changes in the customers' demands. Among the present trends in the requirements for new manufacturing equipments, there are more flexible and ...
Archimède, Bernard, Desforges, Xavier
core   +3 more sources

A cooperative cellular and broadcast conditional access system for Pay-TV systems [PDF]

open access: yes, 2010
This is the author's accepted manuscript. The final published article is available from the link below. Copyright @ 2009 IEEE. Personal use of this material is permitted.
Cosmas, J, Cutts, D, Shirazi, H
core   +1 more source

Tree Parity Machine Rekeying Architectures [PDF]

open access: yes, 2005
The necessity to secure the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e.
Volkmer, Markus, Wallner, Sebastian
core   +5 more sources

A new coupling solution for G3-PLC employment in MV smart grids [PDF]

open access: yes, 2019
This paper proposes a new coupling solution for transmitting narrowband multicarrier power line communication (PLC) signals over medium voltage (MV) power lines.
Artale G.   +7 more
core   +1 more source

Distributed machining control and monitoring using smart sensors/actuators [PDF]

open access: yes, 2004
The study of smart sensors and actuators led, during the past few years, to the development of facilities which improve traditional sensors and actuators in a necessary way to automate production systems. In an other context, many studies are carried out
Desforges, Xavier   +3 more
core   +3 more sources

State of Alaska Election Security Project Phase 2 Report [PDF]

open access: yes, 2008
A laska’s election system is among the most secure in the country, and it has a number of safeguards other states are now adopting. But the technology Alaska uses to record and count votes could be improved— and the state’s huge size, limited road ...
Ayers, Mark   +4 more
core  

FastPay: High-Performance Byzantine Fault Tolerant Settlement [PDF]

open access: yes, 2020
FastPay allows a set of distributed authorities, some of which are Byzantine, to maintain a high-integrity and availability settlement system for pre-funded payments.
Baudet, Mathieu   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy