Results 1 to 10 of about 927,073 (74)

A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications [PDF]

open access: yesIEEE Internet of Things Journal, 2022, 2022
Fingerprint authentication techniques have been employed in various Internet of Things (IoT) applications for access control to protect private data, but raw fingerprint template leakage in unprotected IoT applications may render the authentication system insecure.
arxiv   +1 more source

Study of Zero-Knowledge protocols and Elliptic Curve Cryptography and their implementation in Smart Card environments using Java Card [PDF]

open access: yesarXiv, 2023
This paper studies the problem of Zero-Knowledge Protocol (ZKP) and elliptic curve cryptographic implementation in a computationally limited environment, such as, the smart cards, using Java Card. Besides that, it is explained how the zero-knowledge protocol was selected to implement it on a smart card and how the benchmarking was conducted to select ...
arxiv  

An Android App for Digital Transport Cards of Smart City: Request for Suggestions [PDF]

open access: yesarXiv, 2021
This paper provides a roadmap for designing the Global Digital Transport Cards Application (GDTCA). GDTCA is an Android Application for people to get a digital transport card online for any city and use it locally. People can top up or withdraw the transport card by using GDT Cards App.
arxiv  

Automorphism Shuffles for Graphs and Hypergraphs and Its Applications [PDF]

open access: yes, 2022
In card-based cryptography, a deck of physical cards is used to achieve secure computation. A shuffle, which randomly permutes a card-sequence along with some probability distribution, ensures the security of a card-based protocol. The authors proposed a new class of shuffles called graph shuffles, which randomly permutes a card-sequence by an ...
arxiv   +1 more source

Identifying Human Mobility Patterns using Smart Card Data [PDF]

open access: yesarXiv, 2022
Human mobility is subject to collective dynamics that are the outcome of numerous individual choices. Smart card data which originated as a means of facilitating automated fare collections has emerged as an invaluable source for analyzing human mobility patterns.
arxiv  

Early Discovery of Chronic Non-attenders by Using NFC Attendance Management System [PDF]

open access: yes, 2018
Near Field Communication (NFC) standards cover communications protocols and data exchange formats. They are based on existing radio-frequency identification (RFID) standards. In Japan, Felica card is a popular way to identify the unique ID. Recently, the attendance management system (AMS) with RFID technology has been developed as a part of Smart ...
arxiv   +1 more source

A Modular Data Acquisition System using the 10 GSa/s PSEC4 Waveform Recording Chip [PDF]

open access: yes, 2016
We describe a modular multi-channel data acquisition system based on the 5-15 Gigasample-per-second waveform-recording PSEC4 chip. The system architecture incorporates two levels of hardware with FPGA-embedded system control and in-line data processing. The front-end unit is a 30-channel circuit board that holds five PSEC4 ASICs, a clock jitter cleaner,
arxiv   +1 more source

When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data [PDF]

open access: yesarXiv, 2016
Over the past decade, smartphones have become the point of convergence for many applications and services. There is a growing trend in which traditional smart-card based services like banking, transport and access control are being provisioned through smartphones.
arxiv  

Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks [PDF]

open access: yesSEC 2012, IFIP AICT 376, pp. 489-500, 2012, 2012
In this paper, we study the security requirements for remote authentication with password protected smart card. In recent years, several protocols for password-based authenticated key exchange have been proposed. These protocols are used for the protection of password based authentication between a client and a remote server.
arxiv  

Java Card for PayTv Application [PDF]

open access: yesarXiv, 2013
Smart cards are widely used along with PayTV receivers to store secret user keys and to perform security functions to prevent any unauthorized viewing of PayTV channels. Java Card technology enables programs written in the Java programming language to run on smart cards. Smart cards represent one of the smallest computing platforms in use today.
arxiv  

Home - About - Disclaimer - Privacy