Smart Card ID: An Evolving and Viable Technology
暂无分享,去创建一个
[1] Le Minh Kieu,et al. Passenger Segmentation Using Smart Card Data , 2015, IEEE Transactions on Intelligent Transportation Systems.
[2] Himanshu Thapliyal,et al. EE-SPFAL: A Novel Energy-Efficient Secure Positive Feedback Adiabatic Logic for DPA Resistant RFID and Smart Card , 2019, IEEE Transactions on Emerging Topics in Computing.
[3] Albert Levi,et al. Robust Two-factor smart card authentication , 2017, 2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom).
[4] Vanga Odelu,et al. A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards , 2015, IEEE Transactions on Information Forensics and Security.
[5] Chandan Kumar,et al. An Approach for Storage Security in Cloud Computing- A Survey , 2013 .
[6] Xiaolei Ma,et al. Development of a Data-Driven Platform for Transit Performance Measures Using Smart Card and GPS Data , 2014 .
[7] R Padmavathi,et al. Digitalized Aadhar enabled ration distribution using smart card , 2017, 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).
[8] Fan Zhang,et al. Understanding temporal and spatial travel patterns of individual passengers by mining smart card data , 2014, 17th International IEEE Conference on Intelligent Transportation Systems (ITSC).
[9] Xiong Li,et al. Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards , 2011, J. Netw. Comput. Appl..
[10] Dongho Won,et al. Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction , 2016, Int. J. Distributed Sens. Networks.
[11] Shahrel Azmin Suandi,et al. FingerCode for identity verification using fingerprint and smart card , 2015, 2015 10th Asian Control Conference (ASCC).
[12] Suhwan Kim,et al. Differentiating ASK Demodulator for Contactless Smart Cards Supporting VHBR , 2015, IEEE Transactions on Circuits and Systems II: Express Briefs.
[13] Keith Mayes,et al. Smart Cards, Tokens, Security and Applications , 2010 .
[14] Jean-Louis Lanet,et al. Memory Forensics of a Java Card Dump , 2014, CARDIS.
[15] T Daisy Premila Bai. AN ADAPTABLE SECURE SMART CARD ARCHITECTURE FOR INTERNET OF THINGS AND CLOUD COMPUTING , 2016 .
[16] Lai Tu,et al. Estimation of Passenger Route Choice Pattern Using Smart Card Data for Complex Metro Systems , 2016, IEEE Transactions on Intelligent Transportation Systems.
[17] Ali M. Al-Khouri. Targeting Results: Lessons Learned from UAE National ID Program , 2011 .
[18] Amir Moradi,et al. Leakage Assessment Methodology - A Clear Roadmap for Side-Channel Evaluations , 2015, CHES.
[19] Debiao He,et al. Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment , 2012, Wireless Personal Communications.
[20] Asad M. Ali,et al. Making Smart Cards Truly Portable , 2010, IEEE Security & Privacy.
[21] Florian Mendel,et al. On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks , 2014, IACR Cryptol. ePrint Arch..
[22] Sven Türpe,et al. Electronic Identity Cards for User Authentication—Promise and Practice , 2012, IEEE Security & Privacy.
[23] Jia-Lun Tsai,et al. Novel Anonymous Authentication Scheme Using Smart Cards , 2013, IEEE Transactions on Industrial Informatics.
[24] M. Batty,et al. Variability in Regularity: Mining Temporal Mobility Patterns in London, Singapore and Beijing Using Smart-Card Data , 2016, PloS one.
[25] Peter White,et al. The Potential of Public Transport Smart Card Data , 2005 .
[26] Catherine Morency,et al. Smart card data use in public transit: A literature review , 2011 .
[27] Mahmoud Mesbah,et al. Use of Smart Card Fare Data to Estimate Public Transport Origin–Destination Matrix , 2015 .
[28] S. Albert Rabara,et al. Elliptic Curve Cryptography Based Security Framework for Internet of Things (IoT) Enabled Smart Card , 2017, 2017 World Congress on Computing and Communication Technologies (WCCCT).
[29] Chin-Chen Chang,et al. An efficient multi-server password authenticated key agreement scheme using smart cards with access control , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[30] Farid Benhammadi,et al. Embedded Fingerprint Matching on Smart Card , 2013, Int. J. Pattern Recognit. Artif. Intell..
[31] Ashok Kumar Das,et al. Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards , 2011, IET Inf. Secur..
[32] Eun-Jun Yoon,et al. Lightweight authentication with key-agreement protocol for mobile network environment using smart cards , 2016, IET Inf. Secur..
[33] Nigel H. M. Wilson,et al. Analyzing Multimodal Public Transport Journeys in London with Smart Card Fare Payment Data , 2009 .
[34] Takamasa Iryo,et al. Estimation method for railway passengers’ train choice behavior with smart card transaction data , 2010 .
[35] Chunguang Ma,et al. Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme , 2012, ICDCIT.