Spelling suggestions: "subject:"smart cards"" "subject:"smart wards""
61 |
Elektronický geocaching / Electronic geocachingPrůcha, Jan January 2013 (has links)
The master’s thesis is focusing on electronization of worldwide known game geocaching. It contains introduction to classic geocashing, analysis of current status and outline of possible solution. The design of electronization is based on smart card Gemalto. Very important part of the thesis is cryptographic security, therefore there is explanation of symetric and asymetric cryptography. The digital signature of transmitted message is realized by RSA algorithm, which is supported by the Gemalto smart card. Due to future expandability, it is appropriate to use general protocol. For this reason was chosen the ACP protocol which the supervisor of thesis adviced. In the following part, there is introduction to smart cards, their types and detailed description of Gemalto smart card. In the chapter 7 starts the solution of this issue and there are described the programmed apps.
|
62 |
Použití smart-karet v moderní kryptografii / The use of smart-cards in modern cryptographyKočíř, Michal January 2013 (has links)
This thesis discusses the general use of smart cards in MULTOS in cryptographic applications. At first is described two types of authentication - the authentication by the subject with focusing on authenticators and the authentication by the knowledge. Furthermore there is the description of the anonymous authentication and attribute authentization. This is followed by a description of smart cards with a focus on MULTOS cards. There is also performed analysis of programmable smart cards .NET, JavaCard and MULTOS. Practical part is focused on the implementation of an authentication scheme, which is being developed at FEEC. The communication of authentication protocol is between the MULTOS card and reader connected to a PC. The protocol is composed of cryptographic functions such as random number generation, hash function, modular exponentiation, modular multiplication and difference of large numbers. It was also implemented the measurement of specific applications.
|
63 |
Autentizační protokoly a ochrana soukromí / Authentication Protocols and Privacy ProtectionHajný, Jan January 2012 (has links)
Tato dizertační práce se zabývá kryptografickými prostředky pro autentizaci. Hlavním tématem však nejsou klasické autentizační protokoly, které nabízejí pouze ověření identity, ale tzv. atributové autentizační systémy, pomocí kterých mohou uživatelé prokazovat svoje osobní atributy. Tyto atributy pak mohou představovat jakékoliv osobní informace, např. věk, národnost či místo narození. Atributy mohou být prokazovány anonymně a s podporou mnoha funkcí na ochranu digitální identity. Mezi takové funkce patří např. nespojitelnost autentizačních relací, nesledovatelnost, možnost výběru prokazovaných atributů či efektivní revokace. Atributové autentizační systémy jsou již nyní považovány za nástupce současných systémů v oficiálních strategických plánech USA (NSTIC) či EU (ENISA). Část požadovaných funkcí je již podporována existujícími kryptografickými koncepty jako jsou U-Prove či idemix. V současné době však není známý systém, který by poskytoval všechny potřebné funkce na ochranu digitální identity a zároveň byl prakticky implementovatelný na zařízeních, jako jsou čipové karty. Mezi klíčové slabiny současných systémů patří především chybějící nespojitelnost relací a absence revokace. Není tak možné efektivně zneplatnit zaniklé uživatele, ztracené či ukradené autentizační karty či karty škodlivých uživatelů. Z těchto důvodů je v této práci navrženo kryptografické schéma, které řeší slabiny nalezené při analýze existujících řešení. Výsledné schéma, jehož návrh je založen na ověřených primitivech, jako jsou $\Sigma$-protokoly pro důkazy znalostí, kryptografické závazky či ověřitelné šifrování, pak podporuje všechny požadované vlastnosti pro ochranu soukromí a digitální identity. Zároveň je však návrh snadno implementovatelný v prostředí smart-karet. Tato práce obsahuje plný kryptografický návrh systému, formální ověření klíčových vlastností, matematický model schématu v programu Mathematica pro ověření funkčnosti a výsledky experimentální implementace v prostředí .NET smart-karet. I přesto, že navrhovaný systém obsahuje podporu všech funkcí na ochranu soukromí, včetně těch, které chybí u existujících systémů, jeho výpočetní složitost zůstává stejná či nižší, doba ověření uživatele je tedy kratší než u existujících systémů. Výsledkem je schéma, které může velmi znatelně zvýšit ochranu soukromí uživatelů při jejich ověřování, především při využití v elektronických dokladech, přístupových systémech či Internetových službách.
|
64 |
A framework for the implementation of smartcard system for grant payments in rural South Africa.Malungana, Lario. January 2015 (has links)
M. Tech. Business Information Systems / The South African government provides grants for social assistance as an income. The Social Grant is paid by South African Social Security Agency (SASSA) using the Smartcard System for distribution of funds to beneficiaries who are classified as: Old Age Grant; Child Grant; War Veteran Grant; Foster Care Grant; Disability Grant; Care Dependency Grant; and Grant-in-Aid. Smartcard System was implemented for the developed countries and developing countries, however, in South Africa, the implementation appears to have some deficiencies. The implementation in the rural areas is not the same as the one in the urban areas due to technical infrastructure and training. The main objective of this study is to determine factors that contribute to successful implementation of Smartcard System and to develop an appropriate framework for the implementation of the Smartcard System in rural South Africa. aim of this research.
|
65 |
The impact of the Octopus system on journey-to-work behaviour of bus passengersYu, Chi-ming., 余志明. January 1999 (has links)
published_or_final_version / Transport Policy and Planning / Master / Master of Arts
|
66 |
Adiabatic clock recovery circuit.January 2003 (has links)
Yeung Wing-ki. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2003. / Includes bibliographical references (leaves 64-65). / Abstracts in English and Chinese. / Abstracts --- p.i / 摘要 --- p.iii / Acknowledgements --- p.iv / Contents --- p.v / List of Figures --- p.vii / Chapter 1. --- Introduction --- p.1 / Chapter 1.1. --- Low ower Design --- p.1 / Chapter 1.2. --- ower Consumtion in Conventional CMOS Logic --- p.2 / Chapter 1.3. --- Adiabatic Switching --- p.7 / Chapter 1.3.1. --- Varying Suly Voltage --- p.7 / Chapter 1.3.2. --- Charge Recovery --- p.12 / Chapter 2. --- Adiabatic Quasi-static CMOS Logic --- p.13 / Chapter 2.1. --- AqsCMOS Logic Building Block --- p.14 / Chapter 2.2. --- AqsCMOS inverter --- p.17 / Chapter 2.3. --- ower Reduced in Sinusoidal Suly --- p.18 / Chapter 2.4. --- Clocking Scheme --- p.21 / Chapter 3. --- Contactless Smart Card --- p.23 / Chapter 3.1. --- Architecture --- p.23 / Chapter 3.2. --- Standardization --- p.26 / Chapter 3.3. --- Universal Asynchronous Receiver and Transmitter (UART) --- p.30 / Chapter 4. --- Clock Recovery --- p.35 / Chapter 4.1 --- Adiabatic Ring Oscillator --- p.35 / Chapter 4.2. --- Secial Frequencies of AqsCMOS Ring Oscillator --- p.39 / Chapter 4.3. --- ower Extraction --- p.41 / Chapter 5. --- Evaluations and Measurement Results --- p.43 / Chapter 5.1. --- Outut Transitions --- p.43 / Chapter 5.2. --- Ring Oscillator --- p.44 / Chapter 5.3. --- Synchronization --- p.47 / Chapter 5.4. --- ower Consumtion --- p.49 / Chapter 6. --- Conclusion --- p.53 / Aendix --- p.54 / Glossary --- p.62 / Reference --- p.64
|
67 |
Η εφαρμογή των Τ.Π.Ε. στις σύγχρονες επιχειρήσειςΜήτσος, Βασίλειος 09 October 2014 (has links)
Σκοπός της εργασίας είναι να παρουσιάσει κάποιες ΤΠΕ που χρησιμοποιούν οι επιχειρήσεις, να εξετάσει κατά πόσο αυτά εφαρμόζονται στις επιχειρήσεις αντιπροσωπείας αυτοκινήτων, στις ξενοδοχειακές επιχειρήσεις και στις μικρές επιχειρήσεις οδικών μεταφορών και να παρουσιάσει προτάσεις για την προώθηση και βελτίωση των ΤΠΕ. Χρησιμοποιήθηκε ποιοτική μέθοδος σε δείγμα 30 επιχειρήσεων με συλλογή πρωτογενών στοιχείων μέσω ερωτηματολογίου. Τα αποτελέσματα αναλύθηκαν με τη χρήση του στατιστικού πακέτου SPSS και έδειξαν ότι οι ΤΠΕ χρησιμοποιούνται σε μεγάλο βαθμό στις επιχειρήσεις αντιπροσωπείας αυτοκινήτων, σε μικρότερο στις ξενοδοχειακές επιχειρήσεις και ακόμη λιγότερο στις επιχειρήσεις οδικών μεταφορών. Η έρευνα αυτή μπορεί να χρησιμοποιηθεί από πωλητές τεχνολογιών πληροφορικής και επικοινωνιών για να εξετάσουν αν υπάρχουν προοπτικές για πωλήσεις στους εξεταζόμενους κλάδους. / This study examines the rate of implementation of ICTs in hotels, in road transports and in automobile dealerships in Aitoloakarnania.
|
68 |
The use of a single smart card for transit and non-transit systems : a Singapore case studySenkodu, Chandra Segaran January 2008 (has links)
Governments around the world are investing heavily in smart card infrastructure to enhance transport services. Studies show that smart card technology can improve reliability, reduce maintenance costs, provide a longer life span, and allow more applications to be incorporated in a transit card. As a result, policy makers and transport owners are interested in extending the use of smart cards from transit to non-transit systems to capitalise on their investment. However, little is known about the conditions under which customers would adopt transit cards for non-transit transactions. In Singapore, a contactless transit smart card (ez-link card) was launched in April 2002 to replace the magnetic stored-value card, which was commissioned in December 1990. The ez-link card was introduced as an integrated public transport card for use both on buses and Mass Rapid Transit (MRT) and Light Rail Transit (LRT) trains. This study was undertaken to evaluate customers' response to the use of the ez-link card for non-transit transactions. As the ez-link card is an information technology (IT) product and the first of its kind in the Singapore public transport system, there is a need to understand and appreciate how customers would respond to the change in its use. Various theories and models such as the Technology Acceptance Model (TAM), Theory of Diffusion (TD), Theory of Reasoned Action (TRA) and Theory of Planned Behavior (TPB) were reviewed for their potential to understand and predict customers' intentions to use the ez-link card for non-transit transactions. After much review, the TPB was adopted for identifying the research model and hypotheses in this study. The TPB was used to develop the research model and hypotheses comprising one dependent variable (intention INT) and three independent variables (attitude - ATT, subjective norm - SN and perceived behavioral control - PBC). The TPB was also used to design the questionnaire comprising 16 items to collect data from customers using the ez-link card at bus interchanges and train stations located around Singapore. A pilot survey was conducted on 21 respondents using the intercept interview technique. The data were collected and analysed. With slight modifications, the questionnaire was then used with 300 respondents in the final survey. Descriptive and inferential statistics were used to analyse the data collected from 293 respondents (seven were outliers) using the intercept interview technique in the final survey. Regression analysis explained 80% of the variance in the customers' intention to use the ez-link card for non-transit transactions. While the results provided initial support for the TPB, further examination of the data using exploratory factor analysis revealed high correlations between the ATT and SN. This study concluded that a more parsimonious model would only extract two independent variables (Desirability - DES and Perceived Convenience PEC) to predict customers' intention to use the ez-link card for non-transit transactions. DES and PEC were used to develop a new
|
69 |
Superando os riscos da seguran?a baseada em per?metro - Uma abordagem com identifica??o federada atrav?s de certificados digitais A3/ICP-Brasil e SAMLSouza, Wellington Silva de 18 February 2013 (has links)
Made available in DSpace on 2014-12-17T14:56:15Z (GMT). No. of bitstreams: 1
WellingtonSS_DISSERT.pdf: 5097418 bytes, checksum: 0861f0beded3a7d7e387f3b5d7f448ed (MD5)
Previous issue date: 2013-02-18 / The traditional perimeter-based approach for computer network security (the castle
and the moat model) hinders the progress of enterprise systems and promotes, both in
administrators and users, the delusion that systems are protected. To deal with the new
range of threats, a new data-safety oriented paradigm, called de-perimeterisation , began
to be studied in the last decade. One of the requirements for the implementation of the
de-perimeterised model of security is the definition of a safe and effective mechanism for
federated identity. This work seeks to fill this gap by presenting the specification, modelling
and implementation of a mechanism for federated identity, based on the combination
of SAML and X.509 digital certificates stored in smart-cards, following the A3 standard
of ICP-Brasil (Brazilian official certificate authority and PKI) / A vis?o tradicional de seguran?a em redes de computadores, baseada em per?metro
(modelo do castelo e fosso ), al?m de entravar a evolu??o dos sistemas corporativos,
cria, tanto em administradores quanto usu?rios, a falsa ilus?o de prote??o. Para lidar com
a nova gama de amea?as, um novo paradigma orientado ? seguran?a intr?nseca dos dados,
chamado deperimetriza??o , come?ou a ser estudado na ?ltima d?cada. Um dos requisitos
para a implanta??o do modelo deperimetrizado de seguran?a ? a defini??o de um
mecanismo seguro e eficaz de identifica??o federada. Este trabalho busca preencher essa
lacuna, apresentando a especifica??o, modelagem e implementa??o de um mecanismo de
identifica??o federada, baseado na conjun??o do protocolo SAML e certificados digitais
X.509 armazenados em cart?es-inteligentes, padr?o A3/ICP-Brasil
|
70 |
Smarta Kort : En del av en intelligent IT-lösning i hälso- och sjukvården?Isaksson, Johanna, Sanne, Therése January 2006 (has links)
Background: IT-security is included in the concept of information security, which considers all the security of handling information within an organisation. Good IT-security is about finding the right level of measurement, however, it is hard to implemement new IT-solutions in an organisation, particularly within the health care field, where sensitive information are handled daily. Lately the Swedish government, together with county- and city council, understand the importance of IT and health care. Carelink, an organisation of interest, is working actively for the presumption of benefit by using IT within the health care field. During spring 2006 the Swedish government introduced a national IT-strategy. SITHS, Säker IT inom Hälso- och sjukvården, is a project running by Carelink and is based upon using Smart Cards as an identification. Smart Cards can be used as accesscards for logging on to a computersystem in an organsiation in order to secure an indentity. Purpose: The purpose with this thesis is to investigate the assumptions for how Smart Cards, as a part of a total security solution, can increase the ITsecurity within the Healt Care field. Method: The study was initiated with literature and suitable references to informationssecurity, Smart Cards and Healthcareinformatic. Our empirical study was carried out at Ryhov Hospital in Jönköping, one of Sweden’s newest hospitals. Both qualitative and quantitative studies were conducted, because we chose to do interviews and surveys. The interviews were conducted in order to get a deeper understanding for the organisation and the survey was made in order to investigate the attitudes among the nurses and doctors about the security of computer use. Result: Smart Cards can, according to our studie, increase the IT-security within the Health Care field by creating a safer identification with the use of ITsupport. Smart Cards can also make the process of logging on and off to a computer system easier, which leads to better logging and mobilisation. The study also demonstrates that users are not afraid of the changes a smart card will represent within their organization. / Bakgrund: IT-säkerhet ingår i begreppet informationssäkerhet som avser all säkerhet vid hantering av information inom en organisation. God IT-säkerhet handlar om att hitta rätt nivå med tillhörande åtgärder och nya IT lösningar, men detta är inte enkelt att införa i organisationer och speciellt inte i vården som dagligen hanterar känslig information. Under senare år har regeringen tillsammans med landsting och kommuner fått upp ögonen för vilken nytta IT kan utgöra inom vården. Intresseorganisationen Carelink arbetar aktivt för att skapa förutsättningar att använda IT inom vården, och under våren 2006 har även regeringen presenterat en Nationell IT-strategi. Projektet SITHS, Säker IT inom Hälso- och Sjukvården, drivs av Carelink och bygger på att använda smarta kort som säker identifikation. Korten kan bland annat användas som passerkort och vid inloggning till ett datasystem för att säkerhetsställa en identitet. Syfte: Syftet med denna uppsats är att undersöka förutsättningarna för hur smarta kort, som en del av en total säkerhetslösning, kan förbättra IT-säkerheten inom hälso- och sjukvården. Metod: Studien påbörjades med en genomgång av lämplig litteratur om informationssäkerhet, smarta kort samt vårdinformatik. Den empiriska studien utfördes sedan på Länssjukhuset Ryhov i Jönköping, som är ett av Sveriges nyaste sjukhus. Här genomfördes både kvalitativa och kvantitativa studier, då vi valde att göra ett antal intervjuer samt en enkätundersökning bland vårdgivarna. Intervjuerna gjordes för att få en djupare förståelse för organisationen, och enkätundersökningen för att undersöka attityderna till dagens datoranvändning samt hur säkerheten kring datoriseringen upplevs bland de anställda. Resultat: Enligt studien kan smarta kort förbättra IT-säkerheten inom hälso- och sjukvården genom att skapa en säker identifiering vid användning av ITstöd. Smarta kort kan även bidra till en förenklad in- och utloggningsprocess i ett datorsystem, vilket i sin tur leder till bättre spårbarhet samt ökad mobilitet bland användarna. Undersökningen visar att majoriteten av användarna inte är emot den förändring ett smart kort kan bidra till, utan snarare tvärt om.
|
Page generated in 0.0378 seconds