2009 6th IEEE Consumer Communications and Networking Conference 2009
DOI: 10.1109/ccnc.2009.4784726
|View full text |Cite
|
Sign up to set email alerts
|

A New Secure Communication Framework for Smart Cards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…The most widely utilized method of data protection is cryptography. According to a 2007 Computer Security Institute report [33], 71% of businesses use encryption for their data in transit. Several initiatives are growing in order to better defend against the sophisticated attackers of today who take advantage of the weaknesses in the cryptographic algorithms that are now in use.…”
Section: Network Infrastructure and Protocol Vulnerabilitiesmentioning
confidence: 99%
“…The most widely utilized method of data protection is cryptography. According to a 2007 Computer Security Institute report [33], 71% of businesses use encryption for their data in transit. Several initiatives are growing in order to better defend against the sophisticated attackers of today who take advantage of the weaknesses in the cryptographic algorithms that are now in use.…”
Section: Network Infrastructure and Protocol Vulnerabilitiesmentioning
confidence: 99%
“…Owing to the singularity, biometric authentication protocol is ideal for user authentication, and addresses the weakness of password and smart card methods. The users can use their own biometric characteristics, such as fingerprint [13][14][15], voiceprint and iris scan. Biometric characteristic identification systems offer reliable authentication because biometric characteristics cannot be copied, stolen or easily lost.…”
Section: Introductionmentioning
confidence: 99%