Suggested Topics within your search.
Suggested Topics within your search.
-
1
-
2Published 2001Subjects: “…Smart cards.…”
-
3by Sahir, Siti AishahSubjects: “…Smart cards. Memory cards…”
Published 2006
Get full text
Get full text
-
4“… password authentication scheme using smart cards. We prove that, in spite of the improvement of Yang-Wang…”
Get full text
Get full text
-
5
-
6“…New credit cards containing Europay, MasterCard and Visa (EMV) chips for enhanced security used…”
Get full text
Get full text
Get full text
Get full text
Get full text
-
7by Venter, W.D. Francois, Coleman, Jesse, Chan, Vincent Lau, Phatsoane, Mothepane, Shubber, Zara, Fraser, Nicole“…Many new HIV cases are lost to follow-up before they can be enrolled in care…”
Published 2018
Get full text
Get full text
-
8“…In this paper, we propose an efficient bilateral remote user authentication scheme with smart cards…”
Get full text
Get full text
Get full text
-
9
-
10“… smart cards. After analyzing the improved scheme proposed by Yang-Wang-Chang, we have found…”
Get full text
Get full text
Get full text
-
11“…) card’s tamper resistance to become trusted entities guarding personal information and identifying users…”
Get full text
Get full text
Get full text
Get full text
-
12by Wong, Kam Man“…This document discusses about Automated Teller Machine using UMP smart card in DB2.In UMP,students…”
Published 2012
Get full text
Get full text
Get full text
-
13
-
14“… significantly and lead to project failures. Analysis study was conducted to the ‘hiatus’ smart card project…”
Get full text
Get full text
-
15“…This paper presents a detailed review of remote user authentication schemes with smart cards based…”
Get full text
Get full text
Get full text
-
16
-
17by Md Jani, Mohd Roshadrimi“…Smart card technology remains novel for customers and merchants, in spite of several attempts…”
Published 2015
Get full text
Get full text
-
18“…This paper proposes a novel remote user authentication scheme using smart cards which allows both…”
Get full text
Get full text
Get full text
-
19“… using smart cards. We show various types of forgery attacks against Shen et al.’s timestamp-based…”
Get full text
Get full text
Get full text
-
20