• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 52
  • 9
  • 8
  • 7
  • 6
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 82
  • 82
  • 22
  • 15
  • 15
  • 13
  • 10
  • 10
  • 9
  • 9
  • 9
  • 9
  • 9
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Business impact of IT on firms and vendors : selected studies on computing technologies and electronic micro-payment system /

See-to, Wing Kuen. January 2005 (has links)
Thesis (Ph.D.)--Hong Kong University of Science and Technology, 2005. / Includes bibliographical references (leaves 135-150). Also available in electronic version.
22

SmartBadge : an electronic conference badge using RF and IR communications : a thesis submitted in partial fulfilment of the requirements for the degree of Master of Engineering in Electrical and Computer Engineering from the University of Canterbury, Christchurch, New Zealand /

White, Mark Alexander. January 1900 (has links)
Thesis (M.E.)--University of Canterbury, 2006. / Typescript (photocopy). "February 2006." Includes bibliographical references (p. 121-124). Also available via the World Wide Web.
23

Smart card business strategy in Hong Kong /

Au, Po-ling, Lisa. January 1998 (has links)
Thesis (M.B.A.)--University of Hong Kong, 1998. / Includes bibliographical references.
24

Creative star : the strategic alliance of major transportation operators in Hong Kong /

Lo, Chun-chung, Johnny. January 1996 (has links)
Thesis (M.B.A.)--University of Hong Kong, 1996. / Includes bibliographical references (leaf 96-97).
25

Design of smart card enabled protocols for micro-payment and rapid application development builder for e-commerce.

January 2001 (has links)
by Tsang Hin Chung. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2001. / Includes bibliographical references (leaves 118-124). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Authentication and Transaction Protocol --- p.2 / Chapter 1.2 --- E-Commerce Enabler --- p.3 / Chapter 2 --- Literature Review --- p.4 / Chapter 2.1 --- Cryptographic Preliminaries --- p.4 / Chapter 2.1.1 --- One-Way Hash Function --- p.4 / Chapter 2.1.2 --- Triple DES --- p.5 / Chapter 2.1.3 --- RSA --- p.7 / Chapter 2.1.4 --- Elliptic Curve --- p.8 / Chapter 2.2 --- Smart Cards --- p.8 / Chapter 2.2.1 --- Smart Card Operating Systems --- p.11 / Chapter 2.2.2 --- Java Card --- p.12 / Chapter 2.3 --- Authentication Protocol --- p.14 / Chapter 2.3.1 --- Properties --- p.15 / Chapter 2.3.2 --- Survey --- p.16 / Chapter 2.4 --- Transaction Protocol --- p.19 / Chapter 2.5 --- BAN Logic --- p.20 / Chapter 2.5.1 --- Notation --- p.20 / Chapter 2.5.2 --- Logical Postulates --- p.22 / Chapter 2.5.3 --- Protocol Analysis --- p.25 / Chapter 3 --- Authentication Protocol --- p.26 / Chapter 3.1 --- Formulation of Problem --- p.26 / Chapter 3.2 --- The New Idea --- p.27 / Chapter 3.3 --- Assumptions --- p.29 / Chapter 3.4 --- Trust Model --- p.29 / Chapter 3.5 --- Protocol --- p.30 / Chapter 3.5.1 --- Registration --- p.30 / Chapter 3.5.2 --- Local Authentication --- p.31 / Chapter 3.5.3 --- Remote Authentication --- p.33 / Chapter 3.5.4 --- Silent Key Distribution Scheme --- p.35 / Chapter 3.5.5 --- Advantages --- p.37 / Chapter 3.6 --- BAN Logic Analysis --- p.38 / Chapter 3.7 --- Experimental Evaluation --- p.43 / Chapter 3.7.1 --- Configuration --- p.44 / Chapter 3.7.2 --- Performance Analysis --- p.45 / Chapter 4 --- Transaction Protocol --- p.51 / Chapter 4.1 --- Assumptions --- p.52 / Chapter 4.2 --- Protocol --- p.55 / Chapter 4.3 --- Conflict Resolution Policy --- p.58 / Chapter 4.4 --- Justifications --- p.58 / Chapter 4.5 --- Experimental Evaluation --- p.59 / Chapter 4.5.1 --- Configuration --- p.59 / Chapter 4.5.2 --- Performance Analysis --- p.60 / Chapter 5 --- E-Commerce Builder --- p.65 / Chapter 5.1 --- Overview --- p.66 / Chapter 5.2 --- Design of Smart RAD --- p.68 / Chapter 5.2.1 --- Mechanism --- p.68 / Chapter 5.2.2 --- Java Card Layer --- p.69 / Chapter 5.2.3 --- Host Layer --- p.71 / Chapter 5.2.4 --- Server Layer --- p.72 / Chapter 5.3 --- Implementation --- p.73 / Chapter 5.3.1 --- Implementation Reflection --- p.73 / Chapter 5.3.2 --- Implementation Issues --- p.76 / Chapter 5.4 --- Evaluation --- p.77 / Chapter 5.5 --- An Application Example: Multi-MAX --- p.79 / Chapter 5.5.1 --- System Model --- p.79 / Chapter 5.5.2 --- Design Issues --- p.80 / Chapter 5.5.3 --- Implementation Issues --- p.80 / Chapter 5.5.4 --- Evaluation --- p.84 / Chapter 5.6 --- Future Work --- p.89 / Chapter 6 --- Conclusion --- p.91 / Chapter A --- Detail Experimental Result --- p.93 / Chapter A.1 --- Authentication Time Measurement --- p.94 / Chapter A.2 --- On-Card and Off-Card Computation Time in Authentication --- p.95 / Chapter A.3 --- Authentication Time with Different Servers --- p.96 / Chapter A.4 --- Transaction Time Measurement --- p.97 / Chapter A.5 --- On-card and Off-card Computation Time in Transaction --- p.97 / Chapter B --- UML Diagram --- p.99 / Chapter B.1 --- Package cuhk.cse.demo.applet --- p.99 / Chapter B.2 --- Package cuhk.cse.demo.client --- p.105 / Chapter B.3 --- Package server --- p.110 / Chapter C --- Glossary and Abbreviation --- p.115 / Bibliography --- p.118
26

Adiabatic smart card / RFID.

January 2007 (has links)
Mok, King Keung. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2007. / Includes bibliographical references (leaves 77-79). / Abstracts in English and Chinese. / Abstract --- p.1 / Contents --- p.5 / List of Figures --- p.7 / List of Tables --- p.10 / Acknowledgments --- p.11 / Chapter 1. --- Introduction --- p.12 / Chapter 1.1. --- Low Power Design --- p.12 / Chapter 1.2. --- Power Consumption in Conventional CMOS Logic --- p.13 / Chapter 1.2.1. --- Dynamic Power --- p.13 / Chapter 1.2.2. --- Short-Circuit Power --- p.15 / Chapter 1.2.3. --- Leakage Power --- p.17 / Chapter 1.2.4. --- Static Power --- p.19 / Chapter 1.3. --- Smart Card / RFID --- p.21 / Chapter 1.3.1. --- Applications --- p.21 / Chapter 1.3.2. --- Operating Principle --- p.22 / Chapter 1.3.3. --- Conventional Architecture --- p.23 / Chapter 2. --- Adiabatic Logic --- p.25 / Chapter 2.1. --- Adiabatic Switching --- p.25 / Chapter 2.2. --- Energy Recovery --- p.27 / Chapter 2.3. --- Adiabatic Quasi-Static CMOS Logic --- p.29 / Chapter 2.3.1. --- Logic Structure --- p.29 / Chapter 2.3.2. --- Clocking Scheme --- p.31 / Chapter 2.3.3. --- Flip-flop --- p.33 / Chapter 2.3.4. --- Layout Techniques --- p.38 / Chapter 3. --- Adiabatic RFID --- p.41 / Chapter 3.1. --- System Architecture --- p.41 / Chapter 3.2. --- Circuit Design --- p.42 / Chapter 3.2.1. --- Voltage Limiter --- p.43 / Chapter 3.2.2. --- Substrate Bias Generation Circuit --- p.45 / Chapter 3.2.3. --- Ring Oscillator --- p.46 / Chapter 3.2.4. --- ROM and Control Logic --- p.48 / Chapter 3.2.5. --- Load Modulator --- p.52 / Chapter 3.2.6. --- Experimental Results --- p.53 / Chapter 4. --- Adiabatic Smart Card --- p.59 / Chapter 4.1. --- System Architecture --- p.59 / Chapter 4.2. --- Circuit Design --- p.61 / Chapter 4.2.1. --- ASK Demodulator --- p.61 / Chapter 4.2.2. --- Clock Recovery Circuit --- p.63 / Chapter 4.3. --- Experimental Results --- p.67 / Chapter 5. --- Conclusion --- p.74 / Chapter 6. --- Future Works --- p.76 / Reference --- p.77 / Appendix --- p.80
27

Robust Remote Authentication Schemes with Smart Cards

Chan, Yung-Cheng 14 July 2005 (has links)
Due to low computation cost and convenient portability, smart cards are usually adopted to store the personal secret information of users for remote authentication. Although many remote authentication schemes using smart cards have been introduced in the literatures, they still suffer from some possible attacks or cannot guarantee the quality of performance for smart cards. In this thesis, we classify the security criteria of remote authentication and propose a new remote login scheme using smart cards to satisfy all of these criteria. Not only does the proposed scheme achieve the low computation requirement for smart cards, but it can withstand the replay and the off-line dictionary attacks as well. Moreover, our scheme requires neither any password table for verification nor clock synchronization between each user and the server while providing both mutual authentication and the uniqueness of valid cards.
28

Customer Efficient Electronic Cash Protocols

Lin, Bo-Wei 27 July 2005 (has links)
The technology of electronic cash makes it possible to transmit digital money over communication networks during electronic transactions. Owing to the untraceability and unforgeability properties, electronic cash can protect the privacy of customers and guarantee the security of payments in the transactions. This manuscript introduces an efficient electronic cash protocol where it only requires minimal storage for each customer to withdraw w dollars from the bank and spend the w dollars in a sequence of transactions. Compared with traditional electronic cash protocols, the proposed method greatly reduces not only the storage required for the customers but the communication traffic in the transactions as well. Furthermore, the computation cost of the entire protocol is lower than the traditional ones and it also achieves the customer efficiency property. It turns out that the proposed protocol is much more suitable for the storage-limited or hardware-limited environments, such as smart card computing or mobile commerce, than the traditional electronic cash protocols in a sequence of payments. In addition, we examine the security of the proposed electronic cash protocol from the customer¡¦s, the shop¡¦s, and the bank¡¦s points of view, respectively. Since the proposed protocol is based on a generic partially blind signature scheme, it can be implemented by any partially blind signature scheme as long as it is secure and user efficient.
29

Advances in side-channel cryptanalysis : microarchitectural attacks /

Aciic̦mez, Onur. January 1900 (has links)
Thesis (Ph. D.)--Oregon State University, 2007. / Printout. Includes bibliographical references (leaves 153-161). Also available on the World Wide Web.
30

Securing real-time field area network using small cards

Hancke, Gerhard P. 26 April 2005 (has links)
Field area networks are rapidly expanding to include a wide range of applications. Intelligent nodes on the network will be installed in a small to medium geographical area to monitor and control processes. Such nodes are generally connected to a centralized gateway used by a service provider to monitor and control various applications. The growth in popularity of ubiquitous computing requires the use of embedded network processors in everyday objects. Even though the idea of interaction between the digital devices around us could bring a great deal of convenience it also introduces great risks. Therefore such applications would not only require measurement, control and communication functionality but also a high level of security. Smart cards offer a simple, inexpensive method of incorporating a cryptographic processor into an embedded system that will allow for the implementation of security services. A field area network has resource limitations that influence security service implementation, such as low bandwidth, limited processing power, limited storage capacity and limited communication protocols. This dissertation discussed the implementation of a security policy for embedded field area networks used in distributed real-time applications, using smart card technology. The primary objective is to formulate a policy that can be implemented to secure a field area network. The secondary objective is to determine whether this policy can be implemented using mechanisms provided by smart card technology, while maintaining reasonable system performance. It states the approach taken to finding a viable solution to the problem defined above. A comprehensive literature study provides background on relevant technology and possible solutions. In a system overview the system’s boundaries and functional requirements are defined. The implementation section outlines possible solutions and describes how these can be implemented. Evaluation, verification and quantification of the performance of the proposed system are performed according to the experimental procedures described. The results obtained are documented and discussed. In the conclusion the proposed solution and the findings from the results are placed in context. Future topics of research in this field are suggested. / Dissertation (MSc)--University of Pretoria, 2006. / Computer Science / unrestricted

Page generated in 0.0665 seconds