Filters








3,677 Hits in 7.6 sec

Implementing the Payment Card Industry (PCI) Data Security Standard (DSS)

Enda Bonner, John O' Raw, Kevin Curran
2011 TELKOMNIKA (Telecommunication Computing Electronics and Control)  
Java Simplified Encryption (Jasypt) also offers a form of transparent database encryption using password based encryption.  ...  There is no definitive guide on how to implement the database encryption requirement of the PCI DSS.  ... 
doi:10.12928/telkomnika.v9i2.709 fatcat:t7t42b4txfhirb5ghwunzsv6e4

E-Secured documents & sharing via QRcode

2017 International Journal of Recent Trends in Engineering and Research  
The proposed system aims at developing a system for managing users documents by uploading them on cloud database after verification and making them available to the respective users.The system will enable  ...  The system will send a one-time password (OTP) to user's registered mobile number and email ID to validate user identity.  ...  The proposed system aims at changing this traditional approach into a simple approach of document verification using digital signature and uploading on database and also allows sharing using encrypted  ... 
doi:10.23883/ijrter.2017.3040.fc9qk fatcat:jcx6lfsvwnd4rjwp2endicuu5u

Secure and Authenticated Vehicle Navigation System

Dalip Kamboj, Vijay Kumar, Rohit Vaid
2015 Indian Journal of Science and Technology  
Application/Improvements: Designed secure and authenticated architecture which improve fault tolerance by applying fault tolerance technique on digested information and also reduces server overhead.  ...  The main objective of this paper is to provide security and authenticity for vehicle navigation system.  ...  In our research work the idea of taking Java enabled mobile with SIM card is to do programming in J2ME according to system requirements to set the criteria for sending SMS.  ... 
doi:10.17485/ijst/2015/v8i1/74872 fatcat:ak4gwq2ypjae3kmurq5rul7th4

Secure and Authenticated Vehicle Navigation System

Dalip Kamboj, Vijay Kumar, Rohit Vaid
2015 Indian Journal of Science and Technology  
Application/Improvements: Designed secure and authenticated architecture which improve fault tolerance by applying fault tolerance technique on digested information and also reduces server overhead.  ...  The main objective of this paper is to provide security and authenticity for vehicle navigation system.  ...  In our research work the idea of taking Java enabled mobile with SIM card is to do programming in J2ME according to system requirements to set the criteria for sending SMS.  ... 
doi:10.17485/ijst/2015/v8i28/74872 fatcat:kwlo77gg5ndfjere6d7n7rhjgi

Design and Implementation of In-House Electronic Money Using Java Cards

Hyun Joo Kim, Soo Jong Lee, In Chul Shin
2013 International Journal of Smart Home  
This research designed and implementation in-house e-money using Java Card technology.  ...  In other words, we used by realizing Java Card based technology with superb security and by developing e-money Java applet to ensure safe e-money management.  ...  Structure of Java Card: A Java card requires a Java card virtual machine (JCVM) to support and execute instructions in the Java language [8] . JCVM is a divided into off-card and on-card VM.  ... 
doi:10.14257/ijsh.2013.7.5.11 fatcat:bzdstiq3enfdheetjwu4ozogom

nformation and data protection within a RDBMS

Khmelevsky
2008 Condensed Matter Physics  
Ustimenko had not developed his unique CrypTIM encryption algorithm. Hence, the author would like to thank Vasyl Ustimenko for his new algorithm, patience and supervision of the research conducted.  ...  The third, cryptography can be used to encrypt sensitive data stored on a data storage system [6, 9] , including caches. Special cryptography software on a server can be applied for these purposes.  ...  The one solution to a better security and protection lies in applying the Model Driven Security approach as well as UML to building secure systems by specifying system models along with their security  ... 
doi:10.5488/cmp.11.4.761 fatcat:xvsg6vozhbdhrknpbwsadibd4e

Secure and Effectual Cloud Data Deduplication Verification

Lingeshwaran. B, Tamilselvan. V, Vigneshwaran. V
2018 International Journal of Trend in Scientific Research and Development  
Secure search techniques over encrypted cloud data allow an authorized user to query data files of interest by submitting encrypted query keywords to the cloud server in a privacy-preserving manner.  ...  Thus, a wellfunctioning secure query system should provide a query results verification mechanism that allows the data user to verify results.  ...  As the chosen algorithm, AES performed well on a wide variety of hardware, from 8-bit smart cards to high-performance computers.  ... 
doi:10.31142/ijtsrd11501 fatcat:5zzluojwyrerpo2lrfd2ff42p4

Middleware for Secure Home Access and Control

Andres Marin, Wolfgang Mueller, Robbie Schaefer, Florina Almenarez, Daniel Diaz, Max Ziegler
2007 Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)  
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combination with flexible device  ...  Therefore we propose a home automation middleware for secure management of user and context data that gives access to services just for the authorized users and devices.  ...  Implementation In this section we give some insights on the Profile Database Schema, and on JCCM, one of the authenticators we have developed for java card X.509 certificates.  ... 
doi:10.1109/percomw.2007.80 dblp:conf/percom/MarinMSMDZ07 fatcat:h73fb27urjcidod6omwqvmohfm

Enabling distributed Corba access to smart card applications

A.T.S. Chan, F. Tse, Jiannong Cao, H. Va Leong
2002 IEEE Internet Computing  
Downloaded on March 16, 2009 at 03:22 from IEEE Xplore. Restrictions apply. Network Smart card Applet IP Proxy APDU Card reader Authorized licensed use limited to: Hong Kong Polytechnic University.  ...  Downloaded on March 16, 2009 at 03:22 from IEEE Xplore. Restrictions apply.  ...  Acknowledgments The authors would like to thank the reviewers for their critical comments and helpful advice.  ... 
doi:10.1109/mic.2002.1003127 fatcat:ykdy7qgl7rg4nom2xjjumwiumq

MOBILE BANKING SYSTEM DEVELOPMENT USING NEAR FIELD COMMUNICATION TECHNOLOGY WITH ANDROID-BASED OPERATING SYSTEM

Bisri Nursa Fadillah, Dewi Khairani, Nurul Faizah Rozi
2020 JURNAL TEKNIK INFORMATIKA  
System development using JAVA programming language with Android Studio tools, to access server using PHP with MySQL as database management, IdWebHost as hosting services, as well as data output using JSON  ...  Therefor, the research focused on development of mobile banking system using Near Field Communication (NFC) technology as client authentication and security system.  ...  Mobile banking system consists of three databases on one server using hosting service in IdWebHost. Output data using JSON format. 3.  ... 
doi:10.15408/jti.v13i1.15731 fatcat:ax53yjrhhzaptlthnddtj4zlai

Design and Implementation of an Electronic Identification Card

J. Flores-Escalante, J. Pérez-Dí­az, R. Gómez-Cárdenas
2009 Journal of Applied Research and Technology  
The EIC gives the flexibility to operate in database systems, storage media like chips for smart cards or digital passports.  ...  Two factors of authentication are used in the process: "something the user knows" and "something the user has", in order to provide layers of security to shield the card.  ...  The EIC proposal is not subject to operate solely on a chip card, it can work either on database systems or network environments.  ... 
doi:10.22201/icat.16656423.2009.7.03.492 fatcat:fxgyxdxxzbeklhbxfpteusksmi

Interoperability and Security in Wireless Body Area Network Infrastructures

S. Warren, J. Lebak, Jianchu Yao, J. Creekmore, A. Milenkovic, E. Jovanov
2005 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference  
To increase acceptance of personal monitoring technology while lowering equipment cost, advances must be made in interoperability (at both the system and device levels) and security.  ...  These mobile point-of-care systems are now realizable due to the convergence of technologies such as low-power wireless communication standards, plug-andplay device buses, off-the-shelf development kits  ...  To organize these data for transfer via HL7, a Database Inserter written in Java parses the files and stores their contents in the tables of a local MySQL database: a free, reliable data management system  ... 
doi:10.1109/iembs.2005.1615297 pmid:17281067 fatcat:a552ul6mgncfpoztnebat22zmy

Design and Implementation of Electronic Payment Gateway for Secure Online Payment System

Kyaw Zay Oo
2019 Zenodo  
In secure online payment system, end to end encryption is required to maintain the integrity of transactions carried out online.  ...  In this system, a customer's financial information credit or debit card information is sent directly to a Payment Gateway also called Trusted Third Party, TTP instead of sending it through an online merchant  ...  opportunity to embark on this paper writing.  ... 
doi:10.5281/zenodo.3590718 fatcat:rx3fj2uyqfarzl5epdpgsoyeam

Implementation Issues for Developing Credit Card Software for Mobile Phones

Sukhwant Kaur
2012 International Journal of Information and Electronics Engineering  
Every one carries mobile phone. Our solution approach is to develop a system in which functions of the credit card is incorporated in mobile phone.  ...  The mobile phone is then used as a credit card and it replaces the function of swapping of the credit card each time we shop. Our system is having credit card application stored on mobile phone.  ...  IMPLEMENTATION OF CREDIT CARD SYSTEM ON MOBILE PHONES The application is installed in mobile phone. When the user runs this application, it asks for the password.  ... 
doi:10.7763/ijiee.2012.v2.215 fatcat:ofpoobpvkzgzjadxsbytu5sqwu

Security architectures for network clients

Victoria Skoularidou, Diomidis Spinellis
2003 Information Management & Computer Security  
like social security card, access control to Web sites or online databases, digital signatures for e-mail and Web transactions, public keys for encrypting data transactions, credit/debit cards, e-cash  ...  Smart cards can carry all necessary functions and information on the card, so they do not require access to remote databases at the time of the transaction.  ... 
doi:10.1108/09685220310468664 fatcat:2rgdwt27ivbfvlgjowqk2frhnm
« Previous Showing results 1 — 15 out of 3,677 results