Results 21 to 30 of about 258,635 (295)

The Use of Multifunctional Identification Cards in the Education System of the Republic of Belarus

open access: yesЦифровая трансформация, 2021
The article discusses the experience of introducing and using multifunctional identification cards in the education system of the Republic of Belarus. The main advantages of using radio frequency identification technologies are considered.
A. N. Kurbatski   +4 more
doaj   +2 more sources

Secure password-based authentication scheme with anonymous identity without smart cards

open access: yesTongxin xuebao, 2008
Rhee-Kwon-Lee’s password-based scheme without using smart cards is vulnerable to insider attack,password can’t be changed freely,and its computational cost is high.In order to fix all these security flaws,a new password-based authentication scheme with ...
WANG Bang-ju1   +2 more
doaj   +2 more sources

A Java Reference Model of Transacted Memory for Smart Cards [PDF]

open access: yes, 2002
Transacted Memory offers persistence, undoability and auditing. We present a Java/JML Reference Model of the Transacted Memory system on the basis of our earlier separate Z model and C implementation.
Hartel, Pieter   +2 more
core   +9 more sources

Developing Novel Services for the Railway Station Area through Experience-Driven Design [PDF]

open access: yesInteraction Design and Architecture(s), 2015
Supporting end-users’ practical and emotional needs is an important goal in the design of novel smart services. We present a design research study with the experience-driven design approach to create concept ideas for smart city services.
Jarno Ojala   +7 more
doaj  

An Improvement on Remote User Authentication Schemes Using Smart Cards

open access: yesComputers, 2018
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their claims were such that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line password ...
Chin-Ling Chen   +4 more
doaj   +1 more source

Privacy-Enhancing Group Signcryption Scheme

open access: yesIEEE Access, 2021
In the last decades, several signcryption schemes have been developed for different privacy-enhancing purposes. In this paper, we propose a new privacy-enhancing group signcryption scheme that provides: unforgeability, confidentiality, ciphertext and ...
Sara Ricci   +3 more
doaj   +1 more source

Bio‐Inspired Magnetically Tunable Structural Colors from Elliptical Self‐Assembled Block Copolymer Microparticles

open access: yesAdvanced Functional Materials, EarlyView.
Cephalopod‐inspired photonic microparticles with dynamic structural coloration are fabricated via confined self‐assembly of linear block copolymers into ellipsoids containing stacked lamellae. Embedded superparamagnetic nanoparticles enable rapid magnetic alignment, restoring vivid, angle‐dependent color.
Gianluca Mazzotta   +8 more
wiley   +1 more source

Player Profile Management on NFC Smart Card for Multiplayer Ubiquitous Games

open access: yesInternational Journal of Computer Games Technology, 2009
One of the goals of mixed reality and ubiquitous computing technologies is to provide an adaptable and personal content at any moment, anywhere, and in any context.
Romain Pellerin   +3 more
doaj   +1 more source

Metachromatic Butterfly Bile Pigments for Multi‐Level Optical Security Films

open access: yesAdvanced Functional Materials, EarlyView.
Bio‐derived optical security materials are manufactured by embedding butterfly‐based pigments in polymer films. Tunable color and fluorescence responses arise from concentration‐controlled metachromasy, enabling spatially encoded patterns with distinct visible, UV‐active, and spectral signatures.
Limin Wang, Bodo D. Wilts
wiley   +1 more source

INVESTIGATION OF JAVA SMART CARD TECHNOLOGYFOR MULTI-TASK APPLICATIONS [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2008
The objective of this work is to build a number of different secure applets for Java smart card were each applet is designed for a specific task. Three packages were designed; the first package is the “Secure Wallet” which represents the electronic money
Sinan G. Abid Ali   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy