• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 30
  • 17
  • 8
  • 4
  • 4
  • 4
  • 4
  • 2
  • 2
  • 1
  • Tagged with
  • 79
  • 79
  • 18
  • 17
  • 13
  • 13
  • 11
  • 10
  • 10
  • 10
  • 9
  • 9
  • 9
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Secure contactless mobile financial services with near field communication

Poroye, Adeola Oluwaseyi January 2011 (has links)
Masters of Science / This thesis presents the results from work with three prototypes that use Near Field Communication technology to provide secure contactless mobile nancial services on mobile phones. / South Africa
12

Elaboration d'un modèle d'identité numérique adapté à la convergence / Development of a convergence-oriented digital identity framework

Kiennert, Christophe 10 July 2012 (has links)
L’évolution des réseaux informatiques, et notamment d’Internet, s’ancre dans l’émergence de paradigmes prépondérants tels que la mobilité et les réseaux sociaux. Cette évolution amène à considérer une réorganisation de la gestion des données circulant au cœur des réseaux. L’accès à des services offrant de la vidéo ou de la voix à la demande depuis des appareils aussi bien fixes que mobiles, tels que les Smartphones, ou encore la perméabilité des informations fournies à des réseaux sociaux conduisent à s’interroger sur la notion d’identité numérique et, de manière sous-jacente, à reconsidérer les concepts de sécurité et de confiance. La contribution réalisée dans ce travail de thèse consiste, dans une première partie, à analyser les différents modèles d’identité numérique existants ainsi que les architectures de fédération d’identité, mais également les protocoles déployés pour l’authentification et les problèmes de confiance engendrés par l’absence d’élément sécurisé tel qu’une carte à puce. Dans une deuxième partie, nous proposons, en réponse aux éléments dégagés dans la partie précédente, un modèle d’identité fortement attaché au protocole d’authentification TLS embarqué dans un composant sécurisé, permettant ainsi de fournir les avantages sécuritaires exigibles au cœur des réseaux actuels tout en s’insérant naturellement dans les différents terminaux, qu’ils soient fixes ou mobiles. Enfin, dans une dernière partie, nous expliciterons plusieurs applications concrètes, testées et validées, de ce modèle d’identité, afin d’en souligner la pertinence dans des cadres d’utilisation pratique extrêmement variés. / IT networks evolution, chiefly Internet, roots within the emergence of preeminent paradigms such as mobility and social networks. This development naturally triggers the impulse to reorganize the control of data spreading throughout the whole network. Taking into account access to services such as video or voice on demand coming from terminals which can be fixed or mobile such as smartphones, or also permeability of sensitive information provided to social networks, these factors compel a necessary interrogation about digital identity as a concept. It also intrinsically raises a full-fledged reconsideration of security and trust concepts. The contribution of this thesis project is in line, in a first part, with the analysis of the existing manifold digital identity frameworks as well as the study of current authentication protocols and trust issues raised by the lack of trusted environment such as smartcards. In a second part, as an answer to the concerns suggested in the first part, we will advocate an identity framework strongly bounded to the TLS authentication protocol which needs to be embedded in a secure component, thus providing the mandatory security assets for today’s networks while naturally fitting with a varied scope of terminals, be it fixed or mobile. In a last part, we will finally exhibit a few practical applications of this identity framework, which have been thoroughly tested and validated, this, in order to emphasize its relevance throughout multifarious use cases.
13

校園智慧卡系統應用與發展之研究 / A Study of the Application and Expansion of Campus Smart Card

游麗珠, You, Lai-Ju Unknown Date (has links)
政府推動IC金融卡業務已近八年,然其成效仍十分有限。國內金融機構為區隔消費市場,以IC金融卡延伸之應用功能,結合校園識別證件、圖書證、學生證、停車證…等功能,與各大學院校共同發行校園智慧卡,並以IC金融卡之電子錢、預付電話等功能作為校園內各項支付之工具。民國86年政大智慧卡率先發行,迄今已有二、三十家大學院校發行校園智慧卡,累積發卡量達近百萬張,惟其刷卡消費之實績一直未如預期,且發卡量亦呈趨緩之趨勢,這與金融機構積極推展校園卡,由年輕族群帶動消費市場、改變國人消費習性之理想有所違背。本研究即針對國內IC金融卡之推廣瓶頸、及金融機構推廣校園智慧卡所遭遇之問題進行探討與分析,自財金資訊公司蒐集國內金融機構IC金融卡發卡量與營運量統計資料,以探索性研究方法,進行次級資料分析,以期發現校園智慧卡在推動過程中所遭遇的問題,並提出改善之建議,使校園智慧卡達到多卡合一之功效,同時對未來政府推動各類多功能智慧卡提出建議方案。 / The government implements the IC Card business for almost eight years, but the effects are very limited. To segment consumer market, financial institutions and some universities in Taiwan co-issue Campus Smart Cards. This card has extensible functions of IC Card and can be used as campus identification card, including library ID, student ID, parking ID, etc. Furthermore, Campus Smart Card provides some functions of IC Card that can be used as payment tools on campus, such as electronic money and prepaid phone. In 1997, National Chengchi University took the lead to issue smart cards. To date, about 30 universities have issued Campus Smart Cards for almost million people. However, the total expenditure of Campus Smart Cards is not so good as expected earlier, and the volume of card issue declines. At the beginning, financial institutions issued Campus Smart Cards aggressively to let young people stimulate consumer market and to change consumers' behavior. But the situation doesn't achieve the goal. This paper discusses and analyzes the bottleneck of IC Card issue and the problems that financial institutions face when they push Campus Smart Cards. The research data are collected from FISC (Financial Information Service Co., Ltd.), including volume of card issue and card operation for IC Card. A discovery research method is used to do secondary data analysis. The purposes of this research are listed below: To find out problems during the implementation of Campus Smart Card and provide suggestions. Secondly, try to let Campus Smart Card be a popular multi-function card. Also, provide workable suggestions for the government to implement multi-function Smart Cards in the future.
14

Modelo de transporte público proposto para as cidades de pequeno porte / not available

Motizuki, Wilson Satoro 27 August 2002 (has links)
Neste trabalho é proposto um modelo de sistema de transporte público coletivo para as cidades de pequeno porte (população até 100 mil habitantes), bem como mostrado a viabilidade do modelo através de considerações teóricas e dos resultados obtidos sua implantação na cidade de Matão. A dissertação é composta dos seguintes principais tópicos: considerações gerais visando à contextualização do trabalho, conceitos básicos relevantes sobre sistemas de transporte público coletivo urbano, breve discussão sobre a questão da qualidade e a eficiência no transporte público urbano, descrição das principais características do modelo de transporte público coletivo para as cidades de pequeno porte, estudo da implantação do modelo proposto na cidade de Matão e considerações finais entendidas relevantes no contexto do trabalho. / In this work a model of urban public transportation system for the small cities (population up to 100 thousand inhabitants), is proposed as well as shown the viability of the model through theoretical considerations and of the results obtained by implementing in Matão city. The dissertation is composed of the following main topics: general considerations for the context of the work, important basic concepts on systems of urban public transportation, brief discussion on the subject of the quality and the efficiency in the urban public transportation, description of the main characteristics of the model of urban public transportation for the small cities, study of the model proposed for implementing in Matão city and final considerations.
15

Smart card technology and its perspective in Hong Kong.

January 1997 (has links)
by Yu Wai-Yip. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1997. / Includes bibliographical references (leaves 51-57). / TABLE OF CONTENTS --- p.i / LIST OF EXHIBITS --- p.iii / Chapter / Chapter I. --- INTRODUCTION --- p.1 / Project Objectives --- p.3 / Methodology --- p.3 / Chapter II. --- WHAT IS SMART CARD --- p.5 / A Brief History of Smart Card --- p.5 / Classifications of Smart Card --- p.7 / Categorization by Security Level / Contact Vs Contactless / Chapter III. --- EVOLUTION OF SMART CARD MARKETS --- p.11 / Smart Card Versus Magnetic Stripe Card --- p.11 / Possible Applications --- p.13 / Payment Applications / Transportation Applications / Healthcare Applications / Telecommuncations Applications / Global Market Trend --- p.22 / Chapter IV. --- SMART CARD APPLICATIONS IN HONG KONG --- p.25 / Transportation Applications --- p.27 / Healthcare Applications --- p.28 / Payment Applications --- p.30 / Mondex Card and Visa Cash Card / Hong Kong Jockey Club Smart Card / Identification Applications --- p.32 / Chapter V. --- ANALYSIS OF THE HONG KONG SMART CARD MARKET --- p.33 / Smart Card as An Individual Product --- p.34 / Smart Card as a Form of Monetary Exchange --- p.34 / Smart Card as a System --- p.36 / Technological Environment / Political-legal Environment / Competitive Environment / Economic Environment / Socio-cultural Environment / Perspertive of All-in-one Smart Card in Hong Kong --- p.43 / Chapter VI --- SUMMARY AND CONCLUSIONS --- p.47 / Summary --- p.47 / Conclusions --- p.48 / BIBLIOGRAPHY --- p.51
16

Modelo de transporte público proposto para as cidades de pequeno porte / not available

Wilson Satoro Motizuki 27 August 2002 (has links)
Neste trabalho é proposto um modelo de sistema de transporte público coletivo para as cidades de pequeno porte (população até 100 mil habitantes), bem como mostrado a viabilidade do modelo através de considerações teóricas e dos resultados obtidos sua implantação na cidade de Matão. A dissertação é composta dos seguintes principais tópicos: considerações gerais visando à contextualização do trabalho, conceitos básicos relevantes sobre sistemas de transporte público coletivo urbano, breve discussão sobre a questão da qualidade e a eficiência no transporte público urbano, descrição das principais características do modelo de transporte público coletivo para as cidades de pequeno porte, estudo da implantação do modelo proposto na cidade de Matão e considerações finais entendidas relevantes no contexto do trabalho. / In this work a model of urban public transportation system for the small cities (population up to 100 thousand inhabitants), is proposed as well as shown the viability of the model through theoretical considerations and of the results obtained by implementing in Matão city. The dissertation is composed of the following main topics: general considerations for the context of the work, important basic concepts on systems of urban public transportation, brief discussion on the subject of the quality and the efficiency in the urban public transportation, description of the main characteristics of the model of urban public transportation for the small cities, study of the model proposed for implementing in Matão city and final considerations.
17

e-Pontos: Uma solu??o embarcada de automa??o comercial aplicada a clubes de fidelidade baseado em tecnologia RFID e esmart card

Paiva, Jailton Carlos de 27 July 2012 (has links)
Made available in DSpace on 2014-12-17T14:56:06Z (GMT). No. of bitstreams: 1 JailtonCP_DISSERT.pdf: 2190503 bytes, checksum: ee26df46d54432b596d1d87d4b66b75c (MD5) Previous issue date: 2012-07-27 / In practically all vertical markets and in every region of the planet, loyalty marketers have adopted the tactic of recognition and reward to identify, maintain and increase the yield of their customers. Several strategies have been adopted by companies, and the most popular among them is the loyalty program, which displays a loyalty club to manage these rewards. But the problem with loyalty programs is that customer identification and transfer of loyalty points are made in a semiautomatic. Aiming at this, this paper presents a master's embedded business automation solution called e-Points. The goal of e-Points is munir clubs allegiances with fully automated tooling technology to identify customers directly at the point of sales, ensuring greater control over the loyalty of associate members. For this, we developed a hardware platform with embedded system and RFID technology to be used in PCs tenant, a smart card to accumulate points with every purchase and a web server, which will provide services of interest to retailers and customers membership to the club / Em praticamente todos os mercados verticais e em cada regi?o do planeta, os comerciantes de fidelidade adotaram a t?tica de reconhecimento e recompensa para identificar, manter e aumentar o rendimento de seus clientes. V?rias estrat?gias t?m sido adotadas pelas empresas, e a mais popular entre elas ? o programa de fidelidade, que exibe um clube de fidelidade para gerenciar essas recompensas. Mas o problema com os programas de fidelidade ? que a identifica??o dos clientes e a transmiss?o dos pontos de fidelidade s?o feitas de forma semiautom?tica. Visando isto, o presente trabalho de mestrado apresenta uma solu??o embarcada de automa??o comercial intitulada e-Pontos. O objetivo do e-Pontos ? munir os clubes de fidelidades com ferramental tecnol?gico totalmente automatizado para identificar os clientes diretamente nos pontos de vendas, garantindo um maior controle dos pontos de fidelidade dos membros associados. Para isso, foi desenvolvida uma plataforma de hardware com sistema embarcado e tecnologia RFID que ser? utilizada nos PCs dos lojistas, um smart card para acumular os pontos a cada compra e um servidor web, o qual disponibilizar? servi?os de interesse para os lojistas e os clientes conveniado ao clube
18

Smart card business strategy in Hong Kong

Au, Po-ling, Lisa., 區寶玲. January 1998 (has links)
published_or_final_version / Business Administration / Master / Master of Business Administration
19

Remote Method Invocation for Android Platform / Remote Method Invocation for Android Platform

Magic, Ľuboš January 2012 (has links)
The thesis inquires the potential of a remote method invocation in the context of the Android mobile devices. The primary goal of the thesis is to investigate execution of security-critical parts of application code on smart cards (a prominent example of a smart card is the SIM card). Further, the thesis discusses issues of implementation of the remote method invocation in general, covering also its other frequent forms (such as execution on a remote server). A part of the thesis is a real world case study, which demonstrates the results of the thesis.
20

Towards security limits of embedded hardware devices : from practice to theory

Peeters, Eric 16 November 2006 (has links)
Mobile appliances and especially smart cards have found more and more applications in the past two decades. A little more than ten years ago, the security of those devices still only relied on mathematical complexity and computational infeasibility to force cryptographic systems. Unfortunately, during the execution of cryptographic algorithms, unintentional leakage may be observed. Indeed, the power consumption or the electromagnetic emanations of the device are correlated to the encryption/decryption process. Those unintended channels are called “sidechannel”. Our work was not targeted at the discovery of new “side-channel” sources but rather at a thorough investigation of two of them: the power consumption and the electromagnetic emanation in the near-field domain. In this respect, we dealt with three different aspects of the problem: 1. We carried out many experiments on small microcontrollers but also on FPGAs in order to provide an explanation on the sources and on the set up of an efficient measurement process. Moreover, we provide the first XY scanning pictures of the electromagnetic field radiated by a small microcontroller. 2. Obtaining several measures of the observed side-channel, how is it possible to statistically analyzed these observations? We detail here the different methods available and we introduce an enhancement in the Template Attack process with Principal Component Analysis. 3. Finally, on the basis of this experience, we tried to answer the following question: “Is it possible to provide a theoretical tool to evaluate secure implementations?” The idea was to follow the notion of “Physical Computer” introduced by Micali and Reyzin. In this respect, we provide here two metrics that we consider necessary to evaluate both the strength of the adversary and the information held in the leakage. Respectively we choose the average success rate and the Shannon's mutual information.

Page generated in 0.0622 seconds