An improved electronic voting machine using a microcontroller and a smart card

D Karima, T Victor, R Faycal - 2014 9th International Design …, 2014 - ieeexplore.ieee.org
In this paper, an improved electronic voting machine using a microcontroller and a smart
card is presented. The identity control that was done manually is eliminated and replaced by …

Client-server network architecture for safe pilgrim journey in the Kingdom of Saudi Arabia

IB Dhaou - 2010 IEEE Intelligent Vehicles Symposium, 2010 - ieeexplore.ieee.org
This paper proposes a client-server network architecture for safe pilgrimage in the kingdom
of Saudi Arabia. The proposed architecture allows for continuous tracking and trip planning …

Designing reality fit m-voting

E Eilu, R Baguma - Proceedings of the 7th International Conference on …, 2013 - dl.acm.org
In this paper, we examine the declining trends in voter turn-up in Uganda and other
developing countries. We also look at the possibility of using ICT especially the widely used …

A design and implementation of smart card for secure payment applicable to electric vehicles' charging

K Chen, D Zhao, H Zhang, Y Wang… - 16th International IEEE …, 2013 - ieeexplore.ieee.org
As the main trend of development in new energy vehicles field, electric vehicle is bound to
have a great development all over the world. However, it must have convenient public …

Method for activating an operating system in a security module

J Rudolph, M Rosner - US Patent 9,390,259, 2016 - Google Patents
A method for activating an operating system in a security module, wherein the security
module is operational either by means of a first operating system or by means of a second …

13.56 MHz passive electron tag for smart card application with high-security

K Chen, D Zhao, H Zhang, Y Wang… - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
Information security is the core issue need to be resolved in RF communication. In
accordance with ISO/IEC 14443-A protocol, this paper accomplished the design and …

[PDF][PDF] Improving the security of smart cards through multi-curve ECC

G Prakash, S Sakthivel - International Journal of Applied …, 2014 - researchgate.net
Currently researchers are focusing on the techniques that could withstand and prevent the
user's secret data from the attacks. Cryptographic Smart cards are vulnerable to traditional …

A Light Weight Temper Resistance Client File in an External Memory for Remote User Authentication and Access Control

BA Buhari, AA Obiniyi, SB Junaidu… - International Journal of …, 2023 - igi-global.com
This research proposes a lightweight tamper resistant client file in an external memory as an
alternative to smart card for remote user authentication and access control. The benefit of …

Simulation of APDUs exchanged between a microcontroller smart card and a reader

K Dichou, V Tourtchine… - 2015 7th International …, 2015 - ieeexplore.ieee.org
This paper presents the simulation of Application Protocol data Unit (APDU) exchanged
between a microcontroller smart card and its reader/terminal, that are made according to the …

[引用][C] 基于加速度传感器与小波变换的手机端手势特征身份认证方法

高焕芝, 刘志丹, 郭云镝, 邹北骥, 陈再良 - 中南大学学报: 自然科学版, 2014