warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
9 years 5 months ago
ECG for blind identity verification in distributed systems
This paper discusses ECG biometric recognition in a distributed system, such as smart cards. In a setting where every card is equipped with an ECG sensor to record heart beats fro...
Jiexin Gao, Foteini Agrafioti, Hoda Mohammadzade, ...
127views Biometrics» more  BIOSIG 2009»
9 years 11 months ago
Supplemental Biometric User Authentication for Digital-Signature Smart Cards
: This paper specifies how biometric verification methods can be applied in addition to PIN verification on digital-signature smart cards in compliance with established smart-card ...
Olaf Henniger, Ulrich Waldmann
9 years 11 months ago
Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients
Online auctions of governmental bonds and CO2 certificates are challenged by high availability requirements in face of high peak loads around the auction deadline. Traditionally, t...
Guenther Starnberger, Lorenz Froihofer, Karl M. G&...
102views more  CN 1999»
10 years 1 months ago
Web-Enabled Smart Card for Ubiquitous Access of Patient's Medical Record
The combined benefits of smart card to support mobility in a pocket coupled with the ubiquitous access of Web technology, present a new paradigm for medical information access sys...
Alvin T. S. Chan
130views more  DKE 2002»
10 years 1 months ago
Smart card embedded information systems: a methodology for privacy oriented architectural design
The design of very small databases for smart cards and for portable embedded systems is deeply constrained by the peculiar features of the physical medium. Privacy concerns are re...
Cristiana Bolchini, Fabio A. Schreiber
115views more  IJNSEC 2007»
10 years 1 months ago
Novel Secure Communication Protocol for Conditional Access System
A protocol for secure communication between set-top box and smart card in conditional access system is proposed. The proposed protocol uses the Schnorr identification scheme to a...
Yongliang Liu, Xiaolin Yang, Hongxun Yao, Wen Gao
131views more  DEBU 2007»
10 years 1 months ago
Future Trends in Secure Chip Data Management
Secure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous in applications with strong security requirements. Secure chips host personal data that must be care...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
141views Education» more  CORR 2008»
10 years 1 months ago
Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme in an attempt to overcome the flaws of Yang-Shieh's legendary timestamp-base...
Al-Sakib Khan Pathan, Choong Seon Hong
10 years 3 months ago
Enhance Opensst Protocol's Security with Smart Card
As an open source project, Open Simple Secure Transaction (OpenSST) protocol aims to be a secure and transactionoriented protocol for the unsecured network. At present a prototype...
Xinhua Zhang, Alexandre Dulaunoy, Christoph Meinel
10 years 3 months ago
Designing an Embedded Electronic-Prescription Application for Home-Based Telemedicine Using OSGi Framework?
The combined benefits of Open Services Gateway Initiative (OSGi) and Smart card technologies in embedded devices have made the two technologies suitable for developing middleware ...
Patrick O. Bobbie, Sailaja H. Ramisetty, Abdul-Lat...