Results 21 to 30 of about 258,635 (295)
The Use of Multifunctional Identification Cards in the Education System of the Republic of Belarus
The article discusses the experience of introducing and using multifunctional identification cards in the education system of the Republic of Belarus. The main advantages of using radio frequency identification technologies are considered.
A. N. Kurbatski +4 more
doaj +2 more sources
Secure password-based authentication scheme with anonymous identity without smart cards
Rhee-Kwon-Lee’s password-based scheme without using smart cards is vulnerable to insider attack,password can’t be changed freely,and its computational cost is high.In order to fix all these security flaws,a new password-based authentication scheme with ...
WANG Bang-ju1 +2 more
doaj +2 more sources
A Java Reference Model of Transacted Memory for Smart Cards [PDF]
Transacted Memory offers persistence, undoability and auditing. We present a Java/JML Reference Model of the Transacted Memory system on the basis of our earlier separate Z model and C implementation.
Hartel, Pieter +2 more
core +9 more sources
Developing Novel Services for the Railway Station Area through Experience-Driven Design [PDF]
Supporting end-users’ practical and emotional needs is an important goal in the design of novel smart services. We present a design research study with the experience-driven design approach to create concept ideas for smart city services.
Jarno Ojala +7 more
doaj
An Improvement on Remote User Authentication Schemes Using Smart Cards
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their claims were such that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line password ...
Chin-Ling Chen +4 more
doaj +1 more source
Privacy-Enhancing Group Signcryption Scheme
In the last decades, several signcryption schemes have been developed for different privacy-enhancing purposes. In this paper, we propose a new privacy-enhancing group signcryption scheme that provides: unforgeability, confidentiality, ciphertext and ...
Sara Ricci +3 more
doaj +1 more source
Cephalopod‐inspired photonic microparticles with dynamic structural coloration are fabricated via confined self‐assembly of linear block copolymers into ellipsoids containing stacked lamellae. Embedded superparamagnetic nanoparticles enable rapid magnetic alignment, restoring vivid, angle‐dependent color.
Gianluca Mazzotta +8 more
wiley +1 more source
Player Profile Management on NFC Smart Card for Multiplayer Ubiquitous Games
One of the goals of mixed reality and ubiquitous computing technologies is to provide an adaptable and personal content at any moment, anywhere, and in any context.
Romain Pellerin +3 more
doaj +1 more source
Metachromatic Butterfly Bile Pigments for Multi‐Level Optical Security Films
Bio‐derived optical security materials are manufactured by embedding butterfly‐based pigments in polymer films. Tunable color and fluorescence responses arise from concentration‐controlled metachromasy, enabling spatially encoded patterns with distinct visible, UV‐active, and spectral signatures.
Limin Wang, Bodo D. Wilts
wiley +1 more source
INVESTIGATION OF JAVA SMART CARD TECHNOLOGYFOR MULTI-TASK APPLICATIONS [PDF]
The objective of this work is to build a number of different secure applets for Java smart card were each applet is designed for a specific task. Three packages were designed; the first package is the “Secure Wallet” which represents the electronic money
Sinan G. Abid Ali +2 more
doaj +1 more source

