An improved electronic voting machine using a microcontroller and a smart card
D Karima, T Victor, R Faycal - 2014 9th International Design …, 2014 - ieeexplore.ieee.org
In this paper, an improved electronic voting machine using a microcontroller and a smart
card is presented. The identity control that was done manually is eliminated and replaced by …
card is presented. The identity control that was done manually is eliminated and replaced by …
Client-server network architecture for safe pilgrim journey in the Kingdom of Saudi Arabia
IB Dhaou - 2010 IEEE Intelligent Vehicles Symposium, 2010 - ieeexplore.ieee.org
This paper proposes a client-server network architecture for safe pilgrimage in the kingdom
of Saudi Arabia. The proposed architecture allows for continuous tracking and trip planning …
of Saudi Arabia. The proposed architecture allows for continuous tracking and trip planning …
Designing reality fit m-voting
In this paper, we examine the declining trends in voter turn-up in Uganda and other
developing countries. We also look at the possibility of using ICT especially the widely used …
developing countries. We also look at the possibility of using ICT especially the widely used …
A design and implementation of smart card for secure payment applicable to electric vehicles' charging
K Chen, D Zhao, H Zhang, Y Wang… - 16th International IEEE …, 2013 - ieeexplore.ieee.org
As the main trend of development in new energy vehicles field, electric vehicle is bound to
have a great development all over the world. However, it must have convenient public …
have a great development all over the world. However, it must have convenient public …
Method for activating an operating system in a security module
J Rudolph, M Rosner - US Patent 9,390,259, 2016 - Google Patents
A method for activating an operating system in a security module, wherein the security
module is operational either by means of a first operating system or by means of a second …
module is operational either by means of a first operating system or by means of a second …
13.56 MHz passive electron tag for smart card application with high-security
K Chen, D Zhao, H Zhang, Y Wang… - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
Information security is the core issue need to be resolved in RF communication. In
accordance with ISO/IEC 14443-A protocol, this paper accomplished the design and …
accordance with ISO/IEC 14443-A protocol, this paper accomplished the design and …
[PDF][PDF] Improving the security of smart cards through multi-curve ECC
G Prakash, S Sakthivel - International Journal of Applied …, 2014 - researchgate.net
Currently researchers are focusing on the techniques that could withstand and prevent the
user's secret data from the attacks. Cryptographic Smart cards are vulnerable to traditional …
user's secret data from the attacks. Cryptographic Smart cards are vulnerable to traditional …
A Light Weight Temper Resistance Client File in an External Memory for Remote User Authentication and Access Control
BA Buhari, AA Obiniyi, SB Junaidu… - International Journal of …, 2023 - igi-global.com
This research proposes a lightweight tamper resistant client file in an external memory as an
alternative to smart card for remote user authentication and access control. The benefit of …
alternative to smart card for remote user authentication and access control. The benefit of …
Simulation of APDUs exchanged between a microcontroller smart card and a reader
K Dichou, V Tourtchine… - 2015 7th International …, 2015 - ieeexplore.ieee.org
This paper presents the simulation of Application Protocol data Unit (APDU) exchanged
between a microcontroller smart card and its reader/terminal, that are made according to the …
between a microcontroller smart card and its reader/terminal, that are made according to the …