Smart Card Applications and Systems

Author(s):  
Gerald Maradan ◽  
Pierre Cotte ◽  
Thierry Fornas

Securing data is becoming of the utmost strategic importance in today’s digital environment. Open wide networks such as the Internet and inter-dependencies of modern systems have reshaped security requirements of smart card platforms. Smart card chips have been designed for 20 years to protect data and resist against attacks. Design mechanisms, cryptography, software implementation and certification process have all been introduced to provide efficient tamper resistant techniques against piracy. These techniques are re-used by a semiconductor industry demanding even more security. At the same time, smart card industry tries to address this demand and modify its positioning. This global convergence slightly impact new modern integrated systems.

2008 ◽  
pp. 1884-1922
Author(s):  
Gerald Maradan ◽  
Pierre Cotte ◽  
Thierry Fornas

Securing data is becoming of the utmost strategic importance in today’s digital environment. Open wide networks such as the Internet and inter-dependencies of modern systems have reshaped security requirements of smart card platforms. Smart card chips have been designed for 20 years to protect data and resist against attacks. Design mechanisms, cryptography, software implementation and certification process have all been introduced to provide efficient tamper resistant techniques against piracy. These techniques are re-used by a semiconductor industry demanding even more security. At the same time, smart card industry tries to address this demand and modify its positioning. This global convergence slightly impact new modern integrated systems.


2021 ◽  
Vol 13 (1) ◽  
pp. 65-78
Author(s):  
Ajay Kumar Sahu ◽  
Ashish Kumar

The services of the internet play an essential part in the daily life of the users. So, safety and confidentiality of the information are to be maintained to preserve user conviction in various services offered by network. The two-factor-based password verification techniques are used between remote server and legitimate users for verification over insecure channel. Several protocols have been suggested previously claiming their simplicity, privacy, safety, and robustness. The authors proved that their enhanced protocols are vulnerable to different attacks on the network and permit only authenticated users to update their password preserving traceability and identity. Analysis shows that no scheme has fulfilled all the security requirements and achieved entire goals. Therefore, in this article, a scheme has been presented to overcome these issues in the previous schemes to resist illegal access leading to misuse and achieve all the security requirements and goals. The safety analysis of the presented scheme has confirmed its performance in terms of reliability and safety.


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


Author(s):  
Keith M. Martin

This chapter considers eight applications of cryptography. These essentially act as case studies relating to all the previous material. For each application, we identify the security requirements, the application constraints, the choice of cryptography used, and the ways that the keys are managed. We begin with the SSL/TLS protocols used to secure Internet communications. We then examine the cryptography used in W-Fi networks, showing that early cryptographic design mistakes have subsequently been corrected. We then examine the evolving cryptography used to secure mobile telecommunications. This is followed by a discussion of the cryptography that underpins the security of payment card transactions. We look at the cryptography of video broadcasting and identity cards. We then examine the cryptography behind the Tor project, which use cryptography to support anonymous communication on the Internet. Finally, we examine the clever cryptographic design of Bitcoin, showing how use of cryptography can facilitate digital currency.


Author(s):  
Ihor Ponomarenko ◽  
Alina Sapian

The purpose of this article is to consider issues related to the peculiarities of the use of search engine optimization in the implementation of a comprehensive marketing strategy in the digital environment. Research methodology. The research methodology is system-structural and comparative analyzes (to study the application of search engine optimization in the process of improving the efficiency of the company on the Internet); monograph (the study of various software solutions in the field of digital marketing); eco- nomic analysis (when assessing the effectiveness of the use of SEO in the process of attracting the target audience and its impact on the growth of conversions). The scientific novelty – features of using search engine optimization as an effective tool of digital marketing in modern conditions are revealed. The expediency of using SEO to increase the level of competitiveness of the company on the Internet is proved. A set of Internet marketing measures to strengthen the company’s communications with the target audience in the digital environment is revealed, as well as the role in this structure of search engine optimization is outlined. The expediency of building a semantic core as a basic element of search engine optimization of a company’s web resource and creating preconditions for long-term provision of high positions of the site in search services is proved. The subject of the research is the approach to the possibility of using search engine optimization methods in modern conditions to ensure a highly competitive position of the company and its web resources in the digital space in the long period. Conclusions. The digitalization of business leads to the intensification of the use of various digital marketing tools, among which search engine optimization occupies an important place. SEO-optimization of the company’s website involves the implementation of a set of measures aimed at increasing the place of the re- source in search results. Innovative approaches make it possible to integrate an up-to-date keyword list into important elements of a company’s web resource and to constantly update libraries in order to ensure high search engine rankings. Keywords: audience, Internet marketing, search engine optimization, site, targeted traffic.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3584 ◽  
Author(s):  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocols, due to the large scale of the RFID framework. We examined some of the recent RFID protocols in term of security requirements, computation, and attack resistance. We conclude that only five protocols resist all of the major attacks, while only one protocol satisfies all of the security requirements of the RFID system.


Author(s):  
عبد الكريم الدبيسي ◽  
يسرى خالد إبراهيم

The digital environment has brought a lot of changes to the lives of societies and affected and changed their cultures, lifestyles, ways of thinking and interaction with the environment. The digital environment, with its rapid developments, has produced new ideas and behaviors on societies in general and Arab society was not far from these currents, after more than fifteen A year since the Internet entered Iraq, which is one of the most important manifestations of democracy, the latest radical changes in human relations. The information acquired by the human being today is one of the Internet and its culture dependent on it, and here began the study questionably head of that: What is the role of social networking sites in promoting young people's awareness of the importance of the popular movement? The research aims through adopting the survey method (Public Opinion Survey) to identify the most important political, economic and social dimensions of youth awareness that the Internet has brought to them by enhancing information and increasing confidence in the importance of change and persistence on the principle and the research sample is from university students and they are the motors of mobility in the Arab countries Study (Iraq )


Author(s):  
Jalal Kawash ◽  
Christo El Morr ◽  
Hamza Taha ◽  
Wissam Charaf

Commuting forms an integral part of our lives, whether we are commuting for leisure or business. The use of location-based services and mobile computing has potentials to improve commuting experience and awareness. For instance, printed bus schedules have been only recently complemented with online systems to provide bus timing information for the community of public transport commuters. Commuters can nowadays inquire about bus timings by the use of telephony systems and the Internet. However, the information provided to users is statically produced, just like the still in-use old fashion bus route tables, and does not take into consideration delays and cancellations. The next step in the evolution of these schedules must produce live information, track bus movements, and alert commuters of bus arrivals and timings. The experience of commuting using taxis can also be improved beyond the use of telephony, while the most common way of asking for a taxi continues to be by hand waiving. Such improvements are more crucial for commuters that are not completely aware of their surrounding environment, such as tourists and business visitors. This article envisions the formation of networked organizations of commuters, through the use of mobile and location-based services. We discuss scenarios and use cases of such organizations and propose an example software implementation for the supporting services.


2019 ◽  
pp. 274-304
Author(s):  
Andrew Murray

This chapter examines copyright issues from copying and distributing information from the internet. It considers the discussion focuses on how the internet has challenged the application and development of copyright law, considering web-copyright concerns such as linking, caching, and aggregating, citing Google Inc. v Copiepresse SCRL. It spends considerable time discussing the operation of the temporary eproduction right though key cases Infopaq International, and Public Relations Consultants Association v Newspaper Licensing Agency. The analysis then moves on to examine the communication to the public right created by the Copyright and Related Rights in the Information Society Directive, examining the application of the right through key cases such as Nils Svensson v Retriever Sverige, GS Media v Sanoma Media, and Stichting Brein v Ziggo BV.


Sign in / Sign up

Export Citation Format

Share Document