Search Results - "smartcard"

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Enhancement of Security Architecture for Smartcard Based Authentication Protocols by Mohammed, Lawan Ahmed

    Published 2004
    “…The general approach uses trusted devices (specifically smartcards) to provide an area of secure processing and storage. …”
    Get full text
    Get full text
  2. 2

    Smartcard as a payment Alternative: A Diffusion of Innovation Perspective by Yusman, Tina

    Published 2002
    “…The authorities may view SmartCard as beneficial but the consumers may not The result of this study showed that both adopters and non-adopter held different views with regard to SmartCard thus; appropriate promotion strategy is deemed desirable. …”
    Get full text
    Get full text
  3. 3

    On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards by Phan, , RCW, Goi, , BM

    Published 2005
    “…We consider the security of the Rila-Mitchell security protocols recently proposed for biometrics-based smartcard systems. We first present a man-in-the-middle (MITM) attack on one of these protocols and hence show that it fails to achieve mutual authentication between the smartcard and smartcard reader. …”
    Get full text
  4. 4

    On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards by Phan, , RCW, Goi, , BM

    Published 2005
    “…We consider the security of the Rila-Mitchell security protocols recently proposed for biometrics-based smartcard systems. We first present a man-in-the-middle (MITM) attack on one of these protocols and hence show that it fails to achieve mutual authentication between the smartcard and smartcard reader. …”
    Get full text
  5. 5

    User acceptance of ATM and transit applications embedded in Malaysia's national identity smartcard by Yeow, Paul H. P., Loo, W. H.

    Published 2007
    “…Malaysia's national identity smartcard named as MyKad. A research framework was developed based oil the Unified Theory of Acceptance and Use of Technology (UTAUT). …”
    Get full text
  6. 6

    Security validation of smartcard: MCOS by Yahya, Saadiah, Nik Omar, Nik Azmi

    Published 2010
    “…Thus, there is a need for assessing the security of MyKad by an independent third party.This paper will first discuss vulnerability of smartcard by using the attack potential model (CCDB, 2008), and then the appropriateness of the current methods and tools to test the security of smartcard will be investigated.The study concludes that there is no yet a standard of security testing tool imposed on smartcard in Malaysia.The study promotes the developing of security testing tool for MyKad.…”
    Get full text
  7. 7

    A comprehensive assessment framework for Mykad / Nik Azmi Nik Omar by Nik Omar, Nik Azmi

    Published 2012
    “…The Malaysian government too has applied technology to gain the benefit and one of these is using multi-application smartcard which included personal identification. This is followed by other governments from various countries that launched a multipurpose identification smartcard. …”
    Get full text
  8. 8

    Meal electronic payment system by Dheng Siew, Keah

    Published 2012
    “…The project’s final output is wants to implement an efficient payment system with time consuming in each transaction will be as short as possible as within 1 minute.In this project, the contactless smart card is a tool to build the electronic payment system.The smartcard systems have been around for many years,used mainly to secure physical access to corporate facilities.The advantages of the card are its durability and reliability.With the advancement in radio frequency technologies,the contactless smartcard systems reduce the maintenance requirements for the smartcard readers.Their use is also very time efficient because the card needs not be taken out and placed in the card readers. …”
    Get full text
    Get full text
  9. 9

    Malaysian's acceptance towards the multipurpose smart national identity card and driving license by Yeow, , Paul H. P, Loo, , W. H., Chong, , S. C.

    Published 2006
    “…This paper investigates the users' acceptance towards two applications of Malaysian government's multipurpose smartcard (MyKad) i.e. national identity card (NIC) and driving license (DL). …”
    Get full text
  10. 10

    Non-repudiation in order, delivery and payment process for a sustainable online business by Abd Rahman, Abdullah Sani, Masrom, Suraya, Jusoff, Kamaruzaman

    Published 2011
    “…The solutions can also be adapted to any country for the most part except for the delivery process that requires the use of a smartcard-based national identity card. The non-repudiation evidences that are generated from the system can be used by both the consumer and the merchant to resolve possible future disputes. …”
    Get full text
    Get full text
  11. 11

    Designing e-government services: key service attributes and citizen preference structures by Venkatesh, V., Chan, Frank, Thong, J.

    Published 2011
    “…In a two-stage Web-based survey, citizens reported their perceptions about a smartcard technology for transactional e-government services before use, and their use and satisfaction 4 months later. …”
    Get full text
  12. 12

    A relay attack for host-based card emulation (HCE) using NFC-enabled device for mobile payment by Che Hasan, Hafizah

    Published 2018
    “…With a card emulation mode, NFC technology is able to emulate the smartcard such as a credit card and save it in mobile phone. …”
    Get full text
    Get full text
  13. 13

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The multi-factor credentials are proposed for secure identification and authentication based on the combination of username/password (something you know), smartcard (something you have), and fingerprint (biometric which you possess). …”
    Get full text
    Get full text
  14. 14

    Kelebihan, Kekangan dan Penerimaan Sistem Pilihanraya Berkomputer Yang Menggunakan Cap Jari Digital di Institut Pengajian Tinggi by Norshuhaida, Ismail

    Published 2003
    “…This prototype’s verification process will scan the fingerprint which is stored in the voter’s smartcard. While in the voting process, computerized voting system was used to replace pens and papers. …”
    Get full text
    Get full text
  15. 15

    PalmHashing: a novel approach for cancelable biometrics by Tee, Connie, Teoh, Andrew Beng Jin, Goh, Michael Kah Ong, Ngo, David Chek Ling

    Published 2005
    “…The palmhash code can be stored in portable devices such tokens and smartcards for verification. Multiple sets of palmbash codes can be maintained in multiple applications. …”
    Get full text
    Get full text
  16. 16

    Problems relating to the adoption of potentially privacy-invading technologies by Dell, Peter, Uesugi, S., Hitoshi, O., Toko, S.

    Published 2010
    “…For example, the pervasive usage of RFID in the form of smartcards, observed widely in the world, have the potential to reveal private information without the user being aware of it (Uesugi and Okada, 2008). …”
    Get full text
  17. 17

    New IV-Based database encryption scheme using TS block cipher by Zailani Mohamad Sidek, Norbik Bashah Idris, Harihodin Selamat

    Published 2004
    “…All encryption and decryption keys are stored securely in smartcards thus providing minimum cryptographic information to users. …”
    Get full text
    Get full text
  18. 18

    The development of a commercially viable database encryption tool for Oracle8i Rdbms by Kama, Mohd. Nazri, Mohamed Sidek, Zailani

    Published 2005
    “…The security of the scheme is guaranteed with no keys present in the system but stored securely in smartcards. The outcome from this research is realized in OraCrypt application which is implemented by usign Oracle 8i RDBMS.…”
    Get full text
    Get full text
  19. 19

    A new tv-based database encryption scheme using ts block cipher by Mohamed Sidek, Zailani, Idris, Norbik Bashah, Selamat, Harihodin

    Published 2004
    “…All encryption and decryption keys are stored securely in smartcards thus providing minimum cryptographic information to users. …”
    Get full text
    Get full text
  20. 20

    New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field by Md Yasin, Sharifah

    Published 2011
    “…These features are suitable for portable devices such as PDAs, mobile phone, and smartcards. Scalar multiplication is a major operation in elliptic curve cryptosystem. …”
    Get full text
    Get full text