Narrow your search

Library

KU Leuven (5)

VDIC (3)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

ULB (1)

ULiège (1)

VIVES (1)


Resource type

book (5)


Language

English (5)


Year
From To Submit

2005 (5)

Listing 1 - 5 of 5
Sort by
RFID and contactless smart card applications.
Authors: ---
ISBN: 0470011955 Year: 2005 Publisher: Hoboken Wiley

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Biometric data specification for Personal Identity Verification
Authors: --- --- ---
Year: 2005 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Smart cards and mobile handheld devices : an overview and implementation
Authors: --- --- --- ---
Year: 2005 Publisher: [Gaithersburg, Md.] : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but have instead become indispensable tools that offer competitive business advantages for the mobile workforce. While these devices provide productivity benefits, they also pose new risks to an organization's security by the information they contain or can access remotely. Enabling adequate user authentication is the first line of defense against unauthorized use of an unattended, lost, or stolen handheld device. Smart cards have long been the choice of authentication mechanism for many organizations; however, few handheld devices easily support readers for standard-size smart cards. This report describes two novel types of smart cards that use standard interfaces supported by handheld devices, avoiding use of the more cumbersome standard-size smart card readers. These solutions are aimed at helping organization apply smart cards for authentication and other security services. Details of the design and implementation are provided.


Book
Interfaces for Personal Identity Verification
Authors: ---
Year: 2005 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

SP 800-73 specifies smart card interfaces used to retrieve and use identity credentials. These specifications reflect the design goals of interoperability and PIV Card functions. The goals are addressed by specifying PIV data model, communication interface, and application programming interface (API). Specifications include the PIV data model, API, and card interface requirements necessary to comply with the mandated use cases for interoperability across deployments or agencies. Interoperability is defined as the use of PIV identity credentials such that client APIs, compliant card applications and compliant integrated circuit cards can be used interchangeably by information processing systems across Federal agencies. SP 800-73 does not address the back-end processes that must be performed to attain full identity assertion. The document describes two realizations of the client-application programming and card command interfaces for personal identity verification: the transitional interfaces and the end-point interfaces. Transitional interfaces may be used by agencies with an existing identity card program as an optional step in evolving to the end-point interfaces. End-point interfaces are used by agencies without an existing identity card program and by agencies that elect to evolve to the end-point interface in one step rather than two. SP 800-73 is divided into three parts: Part 1 provides specifications common to both the transitional and end-point interfaces and guidance on strategies for migrating from the transitional interfaces to the end-point interfaces; Part 2 describes the subsets of GSC-ISv2.1 that comprise the transitional interfaces to the PIV data model; and Part 3 describes the PIV data model's end-point interfaces.

Construction and analysis of safe, secure, and interoperable smart devices : International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004 : revised selected papers
Authors: ---
ISBN: 9783540242871 3540242872 3540305696 Year: 2005 Publisher: Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer storage devices --- Computer security --- Smart cards --- Data transmission systems --- Ordinateurs --- Sécurité informatique --- Cartes à mémoire --- Données --- Congresses --- Congresses. --- Security measures --- Mémoires --- Congrès --- Sécurité --- Mesures --- Transmissions --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Computer Science --- Electrical Engineering --- Information Technology --- Software Engineering --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Data communication systems --- Transmission of data --- Computer science. --- Special purpose computers. --- Computer programming. --- Software engineering. --- Programming languages (Electronic computers). --- Operating systems (Computers). --- Data encryption (Computer science). --- Computer Science. --- Data Encryption. --- Software Engineering. --- Special Purpose and Application-Based Systems. --- Programming Techniques. --- Programming Languages, Compilers, Interpreters. --- Operating Systems. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer languages --- Computer program languages --- Computer programming languages --- Machine language --- Electronic data processing --- Languages, Artificial --- Computer software engineering --- Engineering --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Special purpose computers --- Informatics --- Science --- Operating systems --- Programming --- Expansion boards (Microcomputers) --- Near-field communication --- Digital communications --- Electronic systems --- Information theory --- Telecommunication systems --- Cryptology.

Listing 1 - 5 of 5
Sort by