SECURE TERMINAL INTERFACE MODULE FOR SMART CARD APPLICATIONS.

被引:0
|
作者
Anon
机构
来源
IBM technical disclosure bulletin | 1985年 / 28卷 / 04期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1488 / 1489
相关论文
共 50 条
  • [21] An Efficient and Secure Smart Card Based Authentication Scheme
    Chen, Chien-Ming
    Xiang, Bin
    Wang, King-Hang
    Zhang, Yong
    Wu, Tsu-Yang
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (04): : 1113 - 1123
  • [22] Multiple applications with a single Smart Card
    Shaw, DT
    Maj, SP
    CERTIFICATION AND SECURITY IN E-SERVICES: FROM E-GOVERNMENT TO E-BUSINESS, 2003, 127 : 189 - 193
  • [23] Encryptive mechanism and applications of smart card
    Jisuanji Gongcheng, 3 (57-60):
  • [24] ONLINE SMART CARD TERMINAL - A CASE-STUDY
    PENDLETON, R
    INFORMATION AGE, 1989, 11 (03): : 171 - 174
  • [25] Design of smart sustainable emulsions for cosmetic applications.
    Amin, Samiul
    JOURNAL OF THE AMERICAN OIL CHEMISTS SOCIETY, 2022, 99 : 171 - 171
  • [26] An improved mutual authentication scheme for smart card secure messaging
    Dang, LJ
    Koi, WD
    Xiao, YX
    PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY FOR DYNAMIC E-BUSINESS, 2004, : 261 - 264
  • [27] Breaking a smart card based secure password authentication scheme
    Yoon, Eun-Jun
    Yoo, Kee-Young
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 83 - +
  • [28] System Level Design of a Secure Healthcare Smart Card System
    Oksar, Merve
    Ors, Berna
    Saldamli, Gokay
    2011 IEEE SYSTEMS AND INFORMATION ENGINEERING DESIGN SYMPOSIUM (SIEDS), 2011, : 170 - 175
  • [29] Checking secure interactions of smart card applets: Extended version
    Bieber, P.
    Cazin, J.
    Girard, P.
    Lanet, J.-L.
    Wiels, V.
    Zanon, G.
    Journal of Computer Security, 2002, 10 (04) : 369 - 398
  • [30] Network smart card - A new paradigm of secure Online transactions
    Ali, A
    Lu, K
    Montgomery, M
    Security and Privacy in the Age of Ubiquitous Computing, 2005, 181 : 267 - 280