SC 2: Secure Communication over Smart Cards

Author(s):  
Nicola Dragoni ◽  
Eduardo Lostal ◽  
Davide Papini ◽  
Javier Fabra
2014 ◽  
Vol 571-572 ◽  
pp. 1172-1175
Author(s):  
Wei Jing Li ◽  
Ping Zhu ◽  
Hua Zhang ◽  
Zheng Ping Jin

Password authentication scheme using smart cards is an important part of securely accessing the server program. In 2012, Chen et al. proposed a robust smart-card-based remote user password authentication scheme. Recently, Li et al. discovered the scheme of Chen et al. cannot really ensure forward secrecy, and it cannot achieve the goal of efficiency for wrong password login. Then, they proposed an enhanced remote user password authentication scheme based on smart cards. In this paper, we propose a novel authentication scheme by using elliptic curve cryptography. The new scheme can achieve both the user anonymity and the goal of efficiency of incorrect password detection, and can also establish a session key for the subsequent secure communication. Moreover, we show by a detailed analysis that it requires lower computation cost while improving the security of the scheme.


2017 ◽  
Author(s):  
Ratnadewi Ratnadewi

Note: This preprint has been presented in the 10th International Conference Asosiasi Ahli dan Dosen RI (ADRI), Batam, 3-5 March 2017--- Cryptography is a method used to create secure communication by manipulating sent messages during the communication occurred so only intended party that can know the content of that messages. Some of the most commonly used cryptography methods to protect sent messages, especially in the form of text, are DES and 3DES cryptography method. This research will explain the DES and 3DES cryptography method and its use for stored data security in smart cards that working in the NFC-based communication system.Several things that will be explained in this research is the ways of working of DES and 3DES cryptography method in doing the protection process of a data and software engineering through the creation of application using C++ programming language to realize and test the performance of DES and 3DES cryptography method in encrypted data writing process to smart cards and decrypted data reading process from smart cards.The execution time of the entering and the reading process data using a smart card DES cryptography method is faster than using 3DES cryptography.


Author(s):  
Amolkirat Singh ◽  
Guneet Saini

Many people lose their life and/or are injured due to accidents or unexpected events taking place on road networks. Besides traffic jams, these accidents generate a tremendous waste of time and fuel. Undoubtedly, if the vehicles are provided with timely and dynamic information related to road traffic conditions, any unexpected events or accidents, the safety and efficiency of the transportation system with respect to time, distance, fuel consumption and environmentally destructive emissions can be improved. In the field of computer and information science, Vehicular Ad hoc Network (VANET) have recently emerged as an effective tool for improving road safety through propagation of warning messages among the vehicles in the network about potential obstacles on the road ahead. VANET is a research area which is in more demand among the researchers, the automobile industries and scientists to discover about the loopholes and advantages of the vehicular networks so that efficient routing algorithms can be developed which can provide reliable and secure communication among the mobile nodes.In this paper, we propose a Groundwork Based Ad hoc On Demand Distance Vector Routing Protocol (GAODV) focus on how the Road Side Units (RSU’s) utilized in the architecture plays an important role for making the communication reliable. In the interval of finding the suitable path from source to destination the packet loss may occur and the delay also is counted if the required packet does not reach the specified destination on time. So to overcome delay, packet loss and to increase throughput GAODV approach is followed. The performance parameters in the GAODV comes out to be much better than computed in the traditional approach.


Author(s):  
P. Jeyadurga ◽  
S. Ebenezer Juliet ◽  
I. Joshua Selwyn ◽  
P. Sivanisha

The Internet of things (IoT) is one of the emerging technologies that brought revolution in many application domains such as smart cities, smart retails, healthcare monitoring and so on. As the physical objects are connected via internet, security risk may arise. This paper analyses the existing technologies and protocols that are designed by different authors to ensure the secure communication over internet. It additionally focuses on the advancement in healthcare systems while deploying IoT services.


2008 ◽  
Vol 3 (1) ◽  
pp. 39-44
Author(s):  
Shoba Bindu C ◽  
Chandra Sekhar Reddy P ◽  
Satya Narayana B

Sign in / Sign up

Export Citation Format

Share Document