نتایج جستجو برای: issuance

تعداد نتایج: 1558  

2001
István Zsolt BERTA Zoltán Ádám MANN

In a complex, smart card based system this feature turns smart cards from passive datastorage devices into active computational units. In fact they contain a tamper resistant secure one-chip microcomputer able to execute various cryptographic functions. Moreover, their potential can be extended after the issuance of the card by uploading various new applications. However, the limited resources ...

Journal: :Softw., Pract. Exper. 2002
Xavier Leroy

This article presents a novel approach to the problem of bytecode verification for Java Card applets. By relying on prior off-card bytecode transformations, we simplify the bytecode verifier and reduce its memory requirements to the point where it can be embedded on a smart card, thus increasing significantly the security of post-issuance downloading of applets on Java Cards. This article descr...

2005
M. Choudary Gorantla Raju Gangishetti Manik Lal Das Ashutosh Saxena

In this paper we propose a certificateless signature scheme based on bilinear pairings. The scheme effectively removes secure channel for key issuance between trusted authority and users and avoids key escrow problem, which is an inherent drawback in ID-based cryptosystems. The scheme uses a simple blinding technique to eliminate the need of secure channel and user chosen secret value to avoid ...

2016
Viral V. Acharya Jun “QJ” Qian Zhishu Yang

With regulations on deposit rates and on-balance-sheet lending, Chinese banks have significantly increased off-balance-sheet activities in recent years, most notably by issuing wealth management products. We examine the relationship between the product characteristics and the issuing banks and find that (1) the scale of product issuance is greater for banks constrained more by on-balance-sheet ...

2013
Mahmood Khalel Ibrahim Mohammed A. Jabbar Hamid

this paper suggests a security framework for egovernment systems. The proposed system is a dynamic web application, represents a secure e-government model, provides the three main security services (authentication, confidentiality and integrity) and could be applied as a security reference model for e-government applications. National ID and password authentication scheme has been used in authe...

2016

Digital asset management is one of promising applications of blockchain technology. Blockchains could provide principal disintermediation between digital asset issuers, application developers and consumers and decouple tasks related to asset management, such as issuance, transaction processing, securing users’ funds and establishing users’ identities. This paper outlines basic components of blo...

Journal: :International Journal of Management and Applied Research 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید