Search Results - "smartcard"
-
1
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…The general approach uses trusted devices (specifically smartcards) to provide an area of secure processing and storage. …”
Get full text
Get full text
-
2
Smartcard as a payment Alternative: A Diffusion of Innovation Perspective
Published 2002“…The authorities may view SmartCard as beneficial but the consumers may not The result of this study showed that both adopters and non-adopter held different views with regard to SmartCard thus; appropriate promotion strategy is deemed desirable. …”
Get full text
Get full text
-
3
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
Published 2005“…We consider the security of the Rila-Mitchell security protocols recently proposed for biometrics-based smartcard systems. We first present a man-in-the-middle (MITM) attack on one of these protocols and hence show that it fails to achieve mutual authentication between the smartcard and smartcard reader. …”
Get full text
-
4
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
Published 2005“…We consider the security of the Rila-Mitchell security protocols recently proposed for biometrics-based smartcard systems. We first present a man-in-the-middle (MITM) attack on one of these protocols and hence show that it fails to achieve mutual authentication between the smartcard and smartcard reader. …”
Get full text
-
5
User acceptance of ATM and transit applications embedded in Malaysia's national identity smartcard
Published 2007“…Malaysia's national identity smartcard named as MyKad. A research framework was developed based oil the Unified Theory of Acceptance and Use of Technology (UTAUT). …”
Get full text
-
6
Security validation of smartcard: MCOS
Published 2010“…Thus, there is a need for assessing the security of MyKad by an independent third party.This paper will first discuss vulnerability of smartcard by using the attack potential model (CCDB, 2008), and then the appropriateness of the current methods and tools to test the security of smartcard will be investigated.The study concludes that there is no yet a standard of security testing tool imposed on smartcard in Malaysia.The study promotes the developing of security testing tool for MyKad.…”
Get full text
-
7
A comprehensive assessment framework for Mykad / Nik Azmi Nik Omar
Published 2012“…The Malaysian government too has applied technology to gain the benefit and one of these is using multi-application smartcard which included personal identification. This is followed by other governments from various countries that launched a multipurpose identification smartcard. …”
Get full text
-
8
Meal electronic payment system
Published 2012“…The project’s final output is wants to implement an efficient payment system with time consuming in each transaction will be as short as possible as within 1 minute.In this project, the contactless smart card is a tool to build the electronic payment system.The smartcard systems have been around for many years,used mainly to secure physical access to corporate facilities.The advantages of the card are its durability and reliability.With the advancement in radio frequency technologies,the contactless smartcard systems reduce the maintenance requirements for the smartcard readers.Their use is also very time efficient because the card needs not be taken out and placed in the card readers. …”
Get full text
Get full text
-
9
Malaysian's acceptance towards the multipurpose smart national identity card and driving license
Published 2006“…This paper investigates the users' acceptance towards two applications of Malaysian government's multipurpose smartcard (MyKad) i.e. national identity card (NIC) and driving license (DL). …”
Get full text
-
10
Non-repudiation in order, delivery and payment process for a sustainable online business
Published 2011“…The solutions can also be adapted to any country for the most part except for the delivery process that requires the use of a smartcard-based national identity card. The non-repudiation evidences that are generated from the system can be used by both the consumer and the merchant to resolve possible future disputes. …”
Get full text
Get full text
-
11
Designing e-government services: key service attributes and citizen preference structures
Published 2011“…In a two-stage Web-based survey, citizens reported their perceptions about a smartcard technology for transactional e-government services before use, and their use and satisfaction 4 months later. …”
Get full text
-
12
A relay attack for host-based card emulation (HCE) using NFC-enabled device for mobile payment
Published 2018“…With a card emulation mode, NFC technology is able to emulate the smartcard such as a credit card and save it in mobile phone. …”
Get full text
Get full text
-
13
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The multi-factor credentials are proposed for secure identification and authentication based on the combination of username/password (something you know), smartcard (something you have), and fingerprint (biometric which you possess). …”
Get full text
Get full text
-
14
Kelebihan, Kekangan dan Penerimaan Sistem Pilihanraya Berkomputer Yang Menggunakan Cap Jari Digital di Institut Pengajian Tinggi
Published 2003“…This prototype’s verification process will scan the fingerprint which is stored in the voter’s smartcard. While in the voting process, computerized voting system was used to replace pens and papers. …”
Get full text
Get full text
-
15
PalmHashing: a novel approach for cancelable biometrics
Published 2005“…The palmhash code can be stored in portable devices such tokens and smartcards for verification. Multiple sets of palmbash codes can be maintained in multiple applications. …”
Get full text
Get full text
-
16
Problems relating to the adoption of potentially privacy-invading technologies
Published 2010“…For example, the pervasive usage of RFID in the form of smartcards, observed widely in the world, have the potential to reveal private information without the user being aware of it (Uesugi and Okada, 2008). …”
Get full text
-
17
New IV-Based database encryption scheme using TS block cipher
Published 2004“…All encryption and decryption keys are stored securely in smartcards thus providing minimum cryptographic information to users. …”
Get full text
Get full text
-
18
The development of a commercially viable database encryption tool for Oracle8i Rdbms
Published 2005“…The security of the scheme is guaranteed with no keys present in the system but stored securely in smartcards. The outcome from this research is realized in OraCrypt application which is implemented by usign Oracle 8i RDBMS.…”
Get full text
Get full text
-
19
A new tv-based database encryption scheme using ts block cipher
Published 2004“…All encryption and decryption keys are stored securely in smartcards thus providing minimum cryptographic information to users. …”
Get full text
Get full text
-
20
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
Published 2011“…These features are suitable for portable devices such as PDAs, mobile phone, and smartcards. Scalar multiplication is a major operation in elliptic curve cryptosystem. …”
Get full text
Get full text