SMART CARDS' Security Issues Crossover Combination-Exploiting the Best of the Current Generation, Mutation or Randomization

Author(s):  
Sudan Jha ◽  
Raghvendra Kumar ◽  
M. Venkatadri
1989 ◽  
Vol 12 (1) ◽  
pp. 25-30 ◽  
Author(s):  
MA Reid ◽  
MS Madan
Keyword(s):  

2020 ◽  
Vol 28 (4) ◽  
pp. 135-159
Author(s):  
Brij B. Gupta ◽  
Shaifali Narayan

In recent years, contactless transactions have risen rapidly. It includes NFC, MST, contactless cards, and many other payment methods. These payment methods have certain security issues, and attackers are in a regular search for the exploits to break its security. These security issues require proper analysis to secure user data from attackers. This article will discuss the contactless smart cards and payment systems in detail including the techniques used for securing user data and different possible attacks on the technology used for communication. The article also presents some countermeasures to prevent the attack and issues with those countermeasures. In addition, the article includes some future research issues and suggestions to overcome the security issues in contactless payment system.


Author(s):  
Simão Melo de Sousa ◽  
Mário M. Freire ◽  
Rui C. Cardoso

Unlike mobile computing, in which hardware moves, mobile code moves from nodes to other nodes and can change the machines where it is executed. A paradigmatic example of such mobile code are Java applets that can be downloaded from a distant machine and executed by a virtual machine embedded in a browser. Multi-application smart cards (like Javacards) are an example of an execution environment that allows the loading and the execution of (mobile) programs into a card after its issuance. Code mobility allows the software reconfiguration without delivering a physical support, as done by Sun initially with Java to reprogram cable TV boxes, or nowadays, by Microsoft to promptly distribute software patches. PostScript files are another type of mobile programs which execute in printers to produce graphic images. Mobile code may also be used in distributed systems to adapt autonomously in order to balance loads or compensate for hardware failures (Brooks, 2004). Mobile code has received a great deal of interest as a promising solution to increase system flexibility, scalability, and reliability. However, to reach such objectives, some issues need to be matured, namely security issues. This article addresses security issues in mobile code paradigms.


1997 ◽  
Vol 161 ◽  
pp. 711-717 ◽  
Author(s):  
John W. Dreher ◽  
D. Kent Cullers

AbstractWe develop a figure of merit for SETI observations which is anexplicitfunction of the EIRP of the transmitters, which allows us to treat sky surveys and targeted searches on the same footing. For each EIRP, we calculate the product of terms measuring the number of stars within detection range, the range of frequencies searched, and the number of independent observations for each star. For a given set of SETI observations, the result is a graph of merit versus transmitter EIRP. We apply this technique to several completed and ongoing SETI programs. The results provide a quantitative confirmation of the expected qualitative difference between sky surveys and targeted searches: the Project Phoenix targeted search is good for finding transmitters in the 109to 1014W range, while the sky surveys do their best at higher powers. Current generation optical SETI is not yet competitive with microwave SETI.


Sign in / Sign up

Export Citation Format

Share Document