• 沒有找到結果。

[PDF] Top 20 Campus Smart Cards with Public-Key Infrastructure

Has 10000 "Campus Smart Cards with Public-Key Infrastructure" found on our website. Below are the top 20 most common "Campus Smart Cards with Public-Key Infrastructure".

Campus Smart Cards with Public-Key Infrastructure

Campus Smart Cards with Public-Key Infrastructure

... design campus-wide secure information systems using multi-purpose smartcards as the portable security ...on public-key cryptography. In our campus card, we incorporate a Hitachi H8/3113 chip ... See full document

5

HKUST Plans to Introduce Java-Based Open Platform Campus Smart Card

HKUST Plans to Introduce Java-Based Open Platform Campus Smart Card

... existing smart card solutions, we have adopted state-of-the-art technologies for next-generation smart card ...as public-key infrastructure (PKI) support, loyalty programs, and mobile ... See full document

1

Secure key-evolving for public key cryptosystems based on the discrete logarithm problem

Secure key-evolving for public key cryptosystems based on the discrete logarithm problem

... the key-evolving protocol in Fig. 2 is key-independent if the factoring of n is ...the public key holders, requiring only one hash-and-square operation per ...in key-evolving protocols ... See full document

10

An ID-based remote user authentication scheme without using smart cards for multi-server environment

An ID-based remote user authentication scheme without using smart cards for multi-server environment

... using smart cards for multi-server environment has been received much attention ...recently. Smart cards however are far from ubiquitous since some obstacles have restricted their practical ... See full document

10

The impacts of smart cards on hospital information systems—An investigation of the first phase of the national health insurance smart card project in Taiwan

The impacts of smart cards on hospital information systems—An investigation of the first phase of the national health insurance smart card project in Taiwan

... now, with data involving identification informa- tion and insurance claims ...the key information for insurance claims is the service- sequence number, which is stored in each individ- ual ...any ... See full document

9

Security Enhancement for Robust Password Authenticated Key Agreement Using Smart Cards

Security Enhancement for Robust Password Authenticated Key Agreement Using Smart Cards

... authenticated key agreement using smart ...session key agreement, low communication and computation cost, and can prevent the insider ...attack with the smart card ... See full document

6

Password authentication schemes with smart cards

Password authentication schemes with smart cards

... In this paper, two practical password authentication schemes are proposed which are based on the con- cepts of ID-based schemes and the smart cards.These schemes [r] ... See full document

7

REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS

REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS

... A signature scheme and communication timestamps are provided in the authentication phase against the potential attacks of replaying a previously intercepted login request[r] ... See full document

4

Chaotic maps-based password-authenticated key agreement using smart cards

Chaotic maps-based password-authenticated key agreement using smart cards

... H: hashing operation; E: modulus exponential operation; S: symmetric encryption or decryption; M: scalar multiplication on elliptic curve; T: Chebyshev maps; Null: can not provide this functionality. 5. Conclusions In ... See full document

1

Agent-Oriented Public Key Infrastructure for Multi-Agent E-Service

Agent-Oriented Public Key Infrastructure for Multi-Agent E-Service

... It is still uncertain whether we can deploy agent technology in large scale on the Web. One of the reasons is that it always takes a considerable of risk for human using agent services on the Web. People are still ... See full document

7

A modified user-friendly remote authentication scheme with smart cards

A modified user-friendly remote authentication scheme with smart cards

... scheme with smart cards Yi-Hwa Chen 1 , Jinn-Ke Jan 2 1 Institute of Applied Mathematics, National Chung Hsing University, Taichung, Taiwan 402 2 Institute of Computer Science, National Chung Hsing ... See full document

3

ADRs and smart health cards

ADRs and smart health cards

... These cards have been in use since July 2003 and have fully replaced paper cards since January ...IC cards to provide medical services for insured ... See full document

1

Security Enhanced Public Key Encryption with Keyword Search

Security Enhanced Public Key Encryption with Keyword Search

... d-Éœå˙ÆÛU Éœå˙ÆÛU Éœå˙ÆÛU, Óœ6_ Óœ6_ Óœ6_ Abstract—We propose a security enhanced version of Boneh’s “Public Key Encryption with Keyword Search” system. The server in the new system is equipped ... See full document

7

A New Public Key Encryption with Equality Test

A New Public Key Encryption with Equality Test

... new public key encryption scheme with equal- ity test (PKEET), which stands for a public key encryption scheme with comparable ...scheme with ciphertext-binded authorities ... See full document

8

Comments on A Remote User Authentication Scheme Using Smart Cards with Forward Secrecy

Comments on A Remote User Authentication Scheme Using Smart Cards with Forward Secrecy

... 4. Conclusion Throughout the discussions and analyses in section 3, we conclude that the A-L scheme cannot work since their scheme cannot perform the authentication equation without the time stamp T or message m . Even ... See full document

4

Adverse Drug Events And Health Smart Cards

Adverse Drug Events And Health Smart Cards

... ADRs and smart health cards The commentary by Paula Rochon and colleagues 1 highlights the importance of information technology in drug safety. In recent years medication er- ror has received considerable ... See full document

1

Elliptic-Curve Undeniable Signatures using Smart Cards

Elliptic-Curve Undeniable Signatures using Smart Cards

... 摘要: Unlike ordinary digital signature systems, the verifier needs the help of the singer or the designated confirmer to verify undeniable signatures or confirmer signatures, respectively. In the past few years, several ... See full document

1

A public-key traitor tracing scheme with revocation using dynamic shares

A public-key traitor tracing scheme with revocation using dynamic shares

... subscriber’s key. We focus on providing revocation capability to public-key traitor tracing ...session key s to encrypt the message M as the cipher block C and embeds s in the enabling block T ... See full document

15

Improvement on a Provable Secure Access Control using Smart Cards

Improvement on a Provable Secure Access Control using Smart Cards

... Department of Computer Science National Chung Hsing University National Chung Hsing University E-mail:yangfy@ms7.hinet.net E-mail:jkjan@cs.nchu.edu.tw Abstract— An access control scheme integrating with user ... See full document

4

An implementation of public key cryptosystem TTM with linear time complexity for decryption

An implementation of public key cryptosystem TTM with linear time complexity for decryption

... 4Department of Electrical Engineering & Department of Com- puter Science and Information Engineering, National Taiwan Uni- versity, Taipei 106, Taiwan e-mail: f1aiQcc.ee.[r] ... See full document

1

Show all 10000 documents...