期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Digital signature systems based on smart card and fingerprint feature 被引量:3
1
作者 You Lin Xu Maozhi Zheng Zhiming 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期825-834,共10页
Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerpr... Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerprint features match his stored template. To resist being tampered on public channel, the user's message and the signed message are encrypted by the signer's public key and the user's public key, respectively. In the other signature system, the keys are generated by combining the signer's fingerprint features, check bits, and a rememberable key, and there are no matching process and keys stored on the smart card. Additionally, there is generally more than one public key in this system, that is, there exist some pseudo public keys except a real one. 展开更多
关键词 digital signature fingerprint feature error-correcting code cryptographic key smart card
下载PDF
Sharing Smart Card Authenticated Sessions Using Proxies
2
作者 Kevin E. Foltz William R. Simpson 《Computer Technology and Application》 2016年第1期28-45,共18页
This paper discusses an approach to share a smart card in one machine with other machines accessible on the local network or the Internet. This allows a user at a browser to use the shared card remotely and access web... This paper discusses an approach to share a smart card in one machine with other machines accessible on the local network or the Internet. This allows a user at a browser to use the shared card remotely and access web applications that requiresmart card authentication. This also enables users to access these applications from browsers and machines that do not have the capability to use a smart card. The approach uses proxies and card reader code to provide this capability to the requesting device.Previous work with remote or shared smart card use either requires continuous access to the smart card machine or specific client software. The approach in this paper works for any device and browser that has proxy settings, creates minimal network traffic and computation on the smart card machine, and allows the client to transfer from one network to another while maintaining connectivity to a server. This paper describes the smart card sharing approach, implementation and validation of the approach using real systems, and security implications for an enterprise using smart cards. 展开更多
关键词 smart card IT security authentication key management PROXY SSL TLS session stealing
下载PDF
An Improved User Authentication and Key Agreement Scheme Providing User Anonymity 被引量:1
3
作者 Ya-Fen Chang Pei-Yu Chang 《Journal of Electronic Science and Technology》 CAS 2011年第4期352-358,共7页
When accessing remote services over public networks, a user authentication mechanism is required because these activities are executed in an insecure communication environment. Recently, Wang et al. proposed an authen... When accessing remote services over public networks, a user authentication mechanism is required because these activities are executed in an insecure communication environment. Recently, Wang et al. proposed an authentication and key agreement scheme preserving the privacy of secret keys and providing user anonymity. Later, Chang et al. indicated that their scheme suffers from two security flaws. First, it cannot resist DoS (denial-of-service) attack because the indicators for the next session are not consistent. Second, the user password may be modified by a malicious attacker because no authentication mechanism is applied before the user password is updated. To eliminate the security flaws and preserve the advantages of Wang et aL's scheme, we propose an improvement in this paper. 展开更多
关键词 AUTHENTICATION key agreement smart card user anonymity.
下载PDF
Key Recovery Against 3DES in CPU Smart Card Based on Improved Correlation Power Analysis 被引量:3
4
作者 Yanting Ren Liji Wu +4 位作者 Hexin Li Xiangyu Li Xiangmin Zhang An Wang Hongyi Chen 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第2期210-220,共11页
The security of CPU smart cards, which are widely used throughout China, is currently being threatened by side-channel analysis. Typical countermeasures to side-channel analysis involve adding noise and filtering the ... The security of CPU smart cards, which are widely used throughout China, is currently being threatened by side-channel analysis. Typical countermeasures to side-channel analysis involve adding noise and filtering the power consumption signal. In this paper, we integrate appropriate preprocessing methods with an improved attack strategy to generate a key recovery solution to the shortcomings of these countermeasures. Our proposed attack strategy improves the attack result by combining information leaked from two adjacent clock cycles. Using our laboratory-based power analysis system, we verified the proposed key recovery solution by performing a successful correlation power analysis on a Triple Data Encryption Standard (3DES) hardware module in a real-life 32-bit CPU smart card. All 112 key bits of the 3DES were recovered with about 80 000 power traces. 展开更多
关键词 Triple Data Encryption Standard (3DES) CPU smart cards power analysis key recovery side-channeanalysis
原文传递
数字电视条件接收系统的安全性分析 被引量:16
5
作者 陈翔 《电视技术》 北大核心 2010年第2期43-45,共3页
介绍了目前流行的数字电视条件接收系统(CAS)的基本加密原理,并对其安全性进行了详细分析,讨论了智能卡攻击、控制字共享等安全威胁和相应的反制措施,最后得出结论,软硬件分离的无卡CA模式是条件接收系统的发展趋势。
关键词 数字电视 条件接收系统 控制字 智能卡 软硬分离
下载PDF
基于SOI的低功耗智能卡芯片技术 被引量:1
6
作者 严光文 张其善 《半导体技术》 CAS CSCD 北大核心 2002年第11期61-63,共3页
利用SIMOX材料制作智能卡是一种新的技术。本文简要介绍了智能卡的发展及应用,描述了利用SOI(SIMOX)技术制作的新型智能卡芯片,概述了其优点,并分析了现存的问题。
关键词 SOI 低功耗 智能卡芯片 微电子集成电路
下载PDF
Anonymous Authentication Scheme Based on Smart Card and Biometrics in the Electronic Medical Environment
7
作者 PU Guangning YIN Fengmei 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2021年第2期183-190,共8页
With the existing anonymous authentication schemes based on biometrics, the user and the server can create the same session key after mutual authentication. If the anonymous authentication scheme is applied in the ele... With the existing anonymous authentication schemes based on biometrics, the user and the server can create the same session key after mutual authentication. If the anonymous authentication scheme is applied in the electronic medical environment, it is also necessary to consider that the patient may access multiple hospital servers. Based on three factors of smart card, random number and biometrics, an anonymous authentication scheme in the electronic medical environment is proposed. In order to reduce the burden of the medical registration and certification center(HC), in the proposed anonymous authentication scheme, the patient only needs to register with HC once, then he/she can apply for visiting each hospital that has joined the medical servers. Security analysis shows that the proposed scheme has anonymity and dual authentication, and can resist various types of attacks, such as insider attack, modification attack, replay attack and smart card loss attack. Efficiency analysis shows that the calculation cost of the proposed scheme in the registration and login phase is lower, and it is slightly higher than Lei's scheme and Khan et al's scheme in the authentication phase. The proposed scheme can not only resist various types of attacks, but also support dual authentication and multi-server environment. With a little modification, the proposed scheme can also be used to other application scenarios requiring anonymous authentication. 展开更多
关键词 AUTHENTICATION ANONYMITY key agreement smart card MULTI-SERVER
原文传递
面向NGB的数字电视条件接收系统的安全分析
8
作者 黄会俭 《微型电脑应用》 2011年第9期11-13,4,共4页
主要介绍了在NGB网络中数字电视条件接收系统的加密原理,并对在新型网络环境中进行CAS建设存在的安全问题进行了分析,对各项安全问题提出了相应的防范措施;最后得出结论:双向网络的可下载CAS是系统建设的趋势。
关键词 数字电视 条件接收系统 控制字 智能卡
下载PDF
从公交IC卡收费系统走向城市一卡通系统
9
作者 周亮 宋昆 闫亚明 《城市公共交通》 2014年第9期38-42,共5页
本文以当前国内普遍应用的公交IC卡收费系统为基础,探讨了使之升级改造为符合国家标准的城市一卡通系统的关键点和对策以及实施策略.
关键词 城市一卡通 公交IC卡收费系统 智能卡(IC卡) 清算管理中心
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部