منابع مشابه
Secure Debit Card Device Model
The project envisages the implementation of an e-payment system utilizing FIPS-201 Smart Card. The system combines hardware and software modules. The hardware module takes data insertions (e.g. currency notes), processes the data and then creates connection with the smart card using serial/USB ports to perform further mathematical manipulations. The hardware interacts with servers at the back f...
متن کاملA secure additive protocol for card players
Consider three players Alice, Bob and Cath who hold a, b and c cards, respectively, from a deck of d = a+ b+ c cards. The cards are all different and players only know their own cards. Suppose Alice and Bob wish to communicate their cards to each other without Cath learning whether Alice or Bob holds a specific card. Considering the cards as consecutive natural numbers 0, 1, ..., we investigate...
متن کاملDesigning a Secure Smart Card Operating System
The ever-increasing computational power of smart cards has made them feasible for applications like electronic passports and military id cards. However, these applications require a secure smart card operating system. In this paper we argue that smart card platforms pose additional security challenges than traditional computer platforms. We discuss our design for a secure smart card operating s...
متن کاملChecking Secure Interactions of Smart Card
This paper presents an approach enabling a smart card is suer to verify that a new applet securely interacts with already down loaded applets A security policy has been de ned that associates levels to applet attributes and methods and de nes authorized ows between levels We propose a technique based on model checking to verify that actual information ows between applets are authorized We illus...
متن کاملChecking Secure Interactions of Smart Card Applets
This paper presents an approach enabling a smart card issuer to verify that a new applet securely interacts with already downloaded applets. A security policy has been de ned that associates levels to applet attributes and methods and de nes authorized ows between levels. We propose a technique based on model checking to verify that actual information ows between applets are authorized. We illu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Forensic Dental Sciences
سال: 2015
ISSN: 0975-1475
DOI: 10.4103/0975-1475.172454