期刊文献+
共找到2,704篇文章
< 1 2 136 >
每页显示 20 50 100
A new modified remote user authentication scheme using smart cards 被引量:4
1
作者 SHEN Zhong-hua 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2008年第3期371-376,共6页
In 2000, a remote user authentication scheme using smart cards was proposed and the masquerade attacks were proved successful on this scheme. Recently, Kumar has suggested the idea of check digits to overcome the abov... In 2000, a remote user authentication scheme using smart cards was proposed and the masquerade attacks were proved successful on this scheme. Recently, Kumar has suggested the idea of check digits to overcome the above attacks with a new scheme that removes these threats well. In this paper it is pointed out that the weakness still exists in Kumar's scheme, and the intruder can login to the remote system through having some information. A new scheme which can overcome these attacks and appears more secure and efficient than Kumar's is presented. 展开更多
关键词 remote user AUTHENTicATION smart card CRYPTOGRAPHY
下载PDF
Security Enhanced Anonymous User Authenticated Key Agreement Scheme Using Smart Card 被引量:3
2
作者 Jaewook Jung Donghoon Lee +1 位作者 Hakjun Lee Dongho Won 《Journal of Electronic Science and Technology》 CAS CSCD 2018年第1期45-49,共5页
Nowadays, the password-based remote user authentication mechanism using smart card is one of the simplest and convenient authentication ways to ensure secure communications over the public network environments. Recent... Nowadays, the password-based remote user authentication mechanism using smart card is one of the simplest and convenient authentication ways to ensure secure communications over the public network environments. Recently, Liu et al. proposed an efficient and secure smart card based password authentication scheme. However, we find that Liu et al.’s scheme is vulnerable to the off-line password guessing attack and user impersonation attack. Furthermore, it also cannot provide user anonymity. In this paper, we cryptanalyze Liu et al.’s scheme and propose a security enhanced user authentication scheme to overcome the aforementioned problems. Especially, in order to preserve the user anonymity and prevent the guessing attack, we use the dynamic identity technique. The analysis shows that the proposed scheme is more secure and efficient than other related authentication schemes. 展开更多
关键词 AUTHENTicATION off-line password guessing attack smart card user anonymity
下载PDF
Design Aspects of CMOS Compatible On-Chip Antenna for Applications of Contact-Less Smart Card
3
作者 倪昊 徐元森 《Journal of Semiconductors》 EI CAS CSCD 北大核心 2003年第5期466-471,共6页
Design aspects of CMOS compatible on-chip antenna for applications of contact-less smart card are discussed.An on-chip antenna model is established and a design method is demonstrated.Experimental results show that sy... Design aspects of CMOS compatible on-chip antenna for applications of contact-less smart card are discussed.An on-chip antenna model is established and a design method is demonstrated.Experimental results show that system-on-chip integrating power reception together with other electronic functions of smart card applications is feasible.In a 6×10 -4T magnetic field of 22.5MHz,an on-chip power of 1.225mW for a 10kΩ load is obtained using a 4mm2 on-chip antenna. 展开更多
关键词 on-chip antenna contact-less smart card CMOS
下载PDF
Security Analysis and Improvement of Authentication Scheme Based on a One-way Hash Function and Diffie-Hellman Key Exchange Using Smart Card 被引量:1
4
作者 Kang-seok CHAE Dai-hoon KIM +1 位作者 Jae-duck CHOI Souh-wan JUNG 《Journal of Measurement Science and Instrumentation》 CAS 2010年第4期360-363,共4页
A new authentication scheme based on a one-way hash function and Diffie-Hellman key exchange using smart card was propused by Yoon et al. in 2005. They claimed that the proposed protocol is against password guessing a... A new authentication scheme based on a one-way hash function and Diffie-Hellman key exchange using smart card was propused by Yoon et al. in 2005. They claimed that the proposed protocol is against password guessing attack. In this paper, the author demonstrate that Yoon's scheme is vulnerable to the off-line password guessing attack by using a stolen smart card and the DoS attack by computational load at the re, note system. An improvement of Yoon's scheme to resist the above attacks is also proposed. 展开更多
关键词 AUTHENTicATION guessing attack DIFFIE-HELLMAN smart card
下载PDF
AN IMPROVED REMOTE PASSWORD AUTHENTICATION SCHEME WITH SMART CARD
5
作者 Jing Chao 《Journal of Electronics(China)》 2012年第6期550-555,共6页
This paper analyzes the security performance of a latest proposed remote two-factor user authentication scheme and proposes an improved scheme based on the dynamic ID to avoid the attacks it suffers. Besides this, in ... This paper analyzes the security performance of a latest proposed remote two-factor user authentication scheme and proposes an improved scheme based on the dynamic ID to avoid the attacks it suffers. Besides this, in our proposed scheme the password is no longer involved in the calculation of verification phase which makes our scheme more secure and costs less than the old one. At last we analyze the performance of our proposed scheme to prove it provides mutual authentication between the user and the server. Moreover, it also resists password guessing attack, server and user masquerade attack and replay attack effectively. 展开更多
关键词 Two-factor Password authentication smart card Dynamic ID
下载PDF
A Self-Encryption Remote User Anonymous Authentication Scheme Using Smart Cards
6
作者 陆荣幸 曹珍富 苏仁旺 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期210-214,共5页
Remote user authentication is essential in distributed network environment to protect unauthorized access of a networked system. However, most of those existing remote user authentication schemes have not provided the... Remote user authentication is essential in distributed network environment to protect unauthorized access of a networked system. However, most of those existing remote user authentication schemes have not provided the user identity anonymity, while user anonymity is particularly important in some practical applications. Therefore, based on self-encryption mechanism, a new remote user authentication scheme was proposed. The scheme not only has no need of maintaining a password table at the remote server, but also can protect the user’s anonymity. 展开更多
关键词 securityt user authentication self-encryption smart card
下载PDF
Sharing Smart Card Authenticated Sessions Using Proxies
7
作者 Kevin E. Foltz William R. Simpson 《Computer Technology and Application》 2016年第1期28-45,共18页
This paper discusses an approach to share a smart card in one machine with other machines accessible on the local network or the Internet. This allows a user at a browser to use the shared card remotely and access web... This paper discusses an approach to share a smart card in one machine with other machines accessible on the local network or the Internet. This allows a user at a browser to use the shared card remotely and access web applications that requiresmart card authentication. This also enables users to access these applications from browsers and machines that do not have the capability to use a smart card. The approach uses proxies and card reader code to provide this capability to the requesting device.Previous work with remote or shared smart card use either requires continuous access to the smart card machine or specific client software. The approach in this paper works for any device and browser that has proxy settings, creates minimal network traffic and computation on the smart card machine, and allows the client to transfer from one network to another while maintaining connectivity to a server. This paper describes the smart card sharing approach, implementation and validation of the approach using real systems, and security implications for an enterprise using smart cards. 展开更多
关键词 smart card IT security authentication key management PROXY SSL TLS session stealing
下载PDF
Personalized Services over the iTV Platform through Non-conditional Smart Card Technology
8
作者 Susanna Spinsante Ennio Gambi 《通讯和计算机(中英文版)》 2012年第1期106-112,共7页
关键词 多媒体家庭平台 智能卡技术 个性化服务 ITV 数字电视技术 数字地面 电视接收器 MHP
下载PDF
基于多级分布式银行的Smart Card电子支付系统 被引量:1
9
作者 赵福祥 王育民 赵红云 《电子与信息学报》 EI CSCD 北大核心 2002年第2期184-191,共8页
在电子支付系统中,采用分布式电子银行方案更适合于网络运行环境,然而在现行的分布式电子银行方案中,每个用户局限在所开帐户的电子银行取得签发的Smart Card和提取或存储电子货币,由于网络的瓶颈作用和安全缺陷,以及用户所处地域的分... 在电子支付系统中,采用分布式电子银行方案更适合于网络运行环境,然而在现行的分布式电子银行方案中,每个用户局限在所开帐户的电子银行取得签发的Smart Card和提取或存储电子货币,由于网络的瓶颈作用和安全缺陷,以及用户所处地域的分散性和流动性等因素的限制、使得单一开户的银行方案在实际应用中其分布式特性并未充分得以发挥。针对此,通过采用代理签字与群签字综合的方法,本文提出了多级电子银行的新方案,并对该方案的安全性进行了分析。 展开更多
关键词 多级分布式银行 smart card电子支付系统 网络安全 电子商务
下载PDF
一种基于Smart Card的远程用户身份验证方案的安全性讨论 被引量:1
10
作者 张忠 向涛 《计算机应用》 CSCD 北大核心 2008年第11期2811-2813,共3页
身份验证是计算机通信的一个重要方面。由于密码验证协议的简单性,它已经被广泛地用于身份验证。最近,Lee氏等利用Smart Card,提出了一个基于随机数的远程用户验证方案。指出了这个方案并不像其提出者所声称的那样安全,同时提出了两种... 身份验证是计算机通信的一个重要方面。由于密码验证协议的简单性,它已经被广泛地用于身份验证。最近,Lee氏等利用Smart Card,提出了一个基于随机数的远程用户验证方案。指出了这个方案并不像其提出者所声称的那样安全,同时提出了两种攻击方法以破解其验证方案。 展开更多
关键词 密码验证 猜测攻击 smart card
下载PDF
Fund budget model for multipurpose transit smart card systems
11
作者 张宁 钱振东 +1 位作者 陈恺 杨利强 《Journal of Southeast University(English Edition)》 EI CAS 2008年第1期95-98,共4页
The fund budget of multipurpose transit smart card systems is studied by stochastic programming to assign limited funds to different applications reasonably. Under the constraints of a gross fund, models of chance-con... The fund budget of multipurpose transit smart card systems is studied by stochastic programming to assign limited funds to different applications reasonably. Under the constraints of a gross fund, models of chance-constrained and dependentchance for the fund budget of multipurpose transit smart card systems are established with application scale and social demand as random variables, respectively aiming to maximize earnings and satisfy the service requirements the furthest; and the genetic algorithm based on stochastic simulation is adopted for model solution. The calculation results show that the fund budget differs greatly with different system objectives which can cause the systems to have distinct expansibilities, and the application scales of some applications may not satisfy user demands with limited funds. The analysis results indicate that the forecast of application scales and application future demands should be done first, and then the system objective is determined according to the system mission, which can help reduce the risks of fund budgets. 展开更多
关键词 multipurpose transit smart card systems fund budgeting stochastic programming genetic algorithm
下载PDF
安全智能存储卡(Secure Micro SDCard)研发与应用 被引量:1
12
作者 张志安 雷佩莹 +2 位作者 张晓蓉 王悦 查黄英 《价值工程》 2012年第19期227-228,共2页
VPN技术是一种非常方便实用的技术,可以实现中心资源的合理利用,通过VPN网络,企业可以以更低的成本连接远程办事机构、出差人员以及业务合作伙伴关键业务。所以针对市场的需求,在市场调研的基础上,我们提出安全智能储存卡的研发和应用,... VPN技术是一种非常方便实用的技术,可以实现中心资源的合理利用,通过VPN网络,企业可以以更低的成本连接远程办事机构、出差人员以及业务合作伙伴关键业务。所以针对市场的需求,在市场调研的基础上,我们提出安全智能储存卡的研发和应用,并针对该研究的相关问题展开阐述。 展开更多
关键词 安全智能存储卡 研发应用 网络
下载PDF
IC卡数据驱动下的公交客流分布及线路优化策略研究
13
作者 肖志良 汪丽娟 郑雁予 《时代汽车》 2024年第3期16-18,共3页
为提升公交车的运营效率,研究以某市公交IC数据为基础,对公交客流进行分析,并提出基于遗传算法改进的公交线路优化模型。研究发现,该市全天公交客流出现早晚两个峰值段。工作日到节假日,客流集中地从市中心附近转变为旅游景点、公园和... 为提升公交车的运营效率,研究以某市公交IC数据为基础,对公交客流进行分析,并提出基于遗传算法改进的公交线路优化模型。研究发现,该市全天公交客流出现早晚两个峰值段。工作日到节假日,客流集中地从市中心附近转变为旅游景点、公园和购物中心等地区。公交线路优化模型将某公交线路的利用率提高了15%,将乘客的平均等待时间降低了21%,有效提高了公交系统的运营效率和乘客满意度。此次研究为提升公交运营效率、改善乘客体验、优化城市交通结构、促进城市可持续发展提供重要依据和方法。 展开更多
关键词 ic 数据驱动 公交客流 分布特征 优化策略
下载PDF
智能卡(IC CARD)通用读写系统及应用
14
作者 郝丽萍 《天津商学院学报》 1998年第2期36-39,80,共5页
介绍了智能卡通用读写系统以及以该系统为工具开发的应用系统。
关键词 智能卡 读写系统 管理自动化 应用 通用协议
下载PDF
Digital signature systems based on smart card and fingerprint feature 被引量:3
15
作者 You Lin Xu Maozhi Zheng Zhiming 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期825-834,共10页
Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerpr... Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerprint features match his stored template. To resist being tampered on public channel, the user's message and the signed message are encrypted by the signer's public key and the user's public key, respectively. In the other signature system, the keys are generated by combining the signer's fingerprint features, check bits, and a rememberable key, and there are no matching process and keys stored on the smart card. Additionally, there is generally more than one public key in this system, that is, there exist some pseudo public keys except a real one. 展开更多
关键词 digital signature fingerprint feature error-correcting code cryptographic key smart card
下载PDF
Exploring the Evolution of Passenger Flow and Travel Time Reliability with the Expanding Process of Metro System Using Smartcard Data 被引量:1
16
作者 Xinwei Ma Yanjie Ji +1 位作者 Yao Fan Chenyu Yi 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2019年第1期17-29,共13页
Metro system has experienced the global rapid rise over the past decades. However,few studies have paid attention to the evolution in system usage with the network expanding. The paper's main objectives are to ana... Metro system has experienced the global rapid rise over the past decades. However,few studies have paid attention to the evolution in system usage with the network expanding. The paper's main objectives are to analyze passenger flow characteristics and evaluate travel time reliability for the Nanjing Metro network by visualizing the smart card data of April 2014,April 2015 and April 2016. We performed visualization techniques and comparative analyses to examine the changes in system usage between before and after the system expansion. Specifically,workdays,holidays and weekends were specially segmented for analysis.Results showed that workdays had obvious morning and evening peak hours due to daily commuting,while no obvious peak hours existed in weekends and holidays and the daily traffic was evenly distributed. Besides,some metro stations had a serious directional imbalance,especially during the morning and evening peak hours of workdays. Serious unreliability occurred in morning peaks on workdays and the reliability of new lines was relatively low,meanwhile,new stations had negative effects on exiting stations in terms of reliability. Monitoring the evolution of system usage over years enables the identification of system performance and can serve as an input for improving the metro system quality. 展开更多
关键词 METRO expansion smart card DATA PASSENGER flow characteristics TRAVEL time reliability visualization
下载PDF
Automatic Test Data Generation for Java Card Applications Using Genetic Algorithm 被引量:2
17
作者 Saher Manaseer Warif Manasir +2 位作者 Mohammad Alshraideh Nabil Abu Hashish Omar Adwan 《Journal of Software Engineering and Applications》 2015年第12期603-616,共14页
The main objective of software testing is to have the highest likelihood of finding the most faults with a minimum amount of time and effort. Genetic Algorithm (GA) has been successfully used by researchers in softwar... The main objective of software testing is to have the highest likelihood of finding the most faults with a minimum amount of time and effort. Genetic Algorithm (GA) has been successfully used by researchers in software testing to automatically generate test data. In this paper, a GA is applied using branch coverage criterion to generate the least possible set of test data to test JSC applications. Results show that applying GA achieves better performance in terms of average number of test data?generations, execution time, and percentage of branch coverage. 展开更多
关键词 SOFTWARE Testing GENETic Algorithm Java smart card
下载PDF
Extracting bus transit boarding stop information using smart card transaction data 被引量:1
18
作者 Zhen Chen Wei Fan 《Journal of Modern Transportation》 2018年第3期209-219,共11页
The smart card-based automated fare collection (AFC) system has become the main method for collecting urban bus and rail transit fares in many cities worldwide. Such smart card technologies provide new opportunities... The smart card-based automated fare collection (AFC) system has become the main method for collecting urban bus and rail transit fares in many cities worldwide. Such smart card technologies provide new opportunities for transportation data collection since the transaction data obtained through AFC system contains a significant amount of archived information which can be gathered and leveraged to help estimate public transit origin–destination matrices. Boarding location detection is an important step particularly when there is no automatic vehicle location (AVL) system or GPS information in the database in some cases. With the analysis of raw data without AVL information in this paper, an algorithm for trip direction detection is built and the directions for any bus in operation can be confirmed. The transaction interval between each adjacent record will also be analyzed to detect the boarding clusters for all trips in sequence. Boarding stops will then be distributed with the help of route information and operation schedules. Finally, the feasibility and practicality of the methodology are tested using the bus transit smart card data collected in Guangzhou, China. 展开更多
关键词 Transit smart card Automated fare collection Boarding location inference
下载PDF
Security &Privacy Implications in the Placement of Biometric-Based ID Card for Rwanda Universities 被引量:1
19
作者 Eugen Harinda Etienne Ntagwirumugara 《Journal of Information Security》 2015年第2期93-100,共8页
Biometric authentication systems are believed to be effective compared to traditional authentication systems. The introduction of biometrics into smart cards is said to result into biometric-based smart ID card with e... Biometric authentication systems are believed to be effective compared to traditional authentication systems. The introduction of biometrics into smart cards is said to result into biometric-based smart ID card with enhanced security. This paper discusses the biometric-based smart ID card with a particular emphasis on security and privacy implications in Rwanda universities environment. It highlights the security and implementation issues. The analysis shows that despite the necessity to implement biometric technology, absence of legal and regulatory requirements becomes a challenge to implementation of the proposed biometric solution. The paper is intended to engage a broad audience from Rwanda universities planning to introduce the biometric-based smart ID cards to verify students and staff for authentication purpose. 展开更多
关键词 BIOMETRicS SECURITY PRIVACY smart ID card
下载PDF
A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
20
作者 Sunil Kumar Dilip Kumar +3 位作者 Ramraj Dangi Gaurav Choudhary Nicola Dragoni Ilsun You 《Computers, Materials & Continua》 SCIE EI 2024年第1期31-63,共33页
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There ... The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny sensors.When it comes to deploying IoT,everyone agrees that security is the biggest issue.This is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square footage.This research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted circumstances.Using lightweight cryptography,the information sent between these gadgets may be secured.In order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance features.We also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio. 展开更多
关键词 IOT a sensor device LIGHTWEIGHT CRYPTOGRAPHY block cipher smart card security and privacy
下载PDF
上一页 1 2 136 下一页 到第
使用帮助 返回顶部