منابع مشابه
Smart Card ID: An Evolving and Viable Technology
In today’s world carrying a number of plastic smart cards to establish our identity has become an integral segment of our routine lives. Identity establishment necessitates a pre stored readily available data about self and to the administrator to authenticate it with claimer’s personal information. There is a distinct requirement of a technological solution for nationwide multipurpose identity...
متن کاملID-Based Certificateless Electronic Cash on Smart Card against Identity Theft and Financial Card Fraud
Secure electronic payment instruments play an important role in retail electronic commerce. As in most countries, people in Taiwan often use credit cards for payments on Internet shopping. However, the information contained in the card includes sensitive data like card number, valid date, and CVC (Card Verification Code) which all easily suffer data leakage, or impersonation attacks. This may c...
متن کاملCryptanalysis and An Efficient Secure ID-Based Remote User Authentication Scheme Using Smart Card pdfkeywords=Attack, Authentication, Password, Secure ID, Smart Card
Remote User authentication protocol is used for verifying the legitimacy of a remote user over insecure network environments. Recently, many secure ID based remote user authentication scheme using smart card have been proposed in the literature. In 2012, Ratan-Sanjay [1] proposed secure ID based remote user authentication scheme using smart card and claimed that their scheme can avoid all types...
متن کاملThe New German ID Card
Besides their use in identity verification at police and border controls, national ID cards are frequently used for commercial applications, too. One objective of the introduction of the new national ID card on 1 November 2010 is to extend the conventional use of ID documents to the digital world. In order to meet this objective, the new ID card offers two electronic functionalities for e-busin...
متن کاملAn Efficient and Secure ID-based Remote User Authentication Scheme using Smart Card
The User Authentication mechanism technology has enjoyed strong growth in recent year, but security threats and facing attacks in authentication have grown equally fast. Today, there are many potential attacks that are targeted at authentication including insider attack, masquerade attack, server spoofing attack, parallel session attack, offline password guessing attack and many more. Recently,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2020
ISSN: 2321-9653
DOI: 10.22214/ijraset.2020.5403