[PDF][PDF] A secure ECC-based electronic medical record system.

KL Tsai, FY Leu, TH Wu, S Chiou, YW Liu… - J. Internet Serv. Inf …, 2014 - isyou.info
In recent years, portable devices and wireless communication have been popularly used by
people in their everyday lives. In fact, with these facilities, due to their usage convenience …

Comparison of ECC and RSA algorithm in multipurpose smart card application

M Savari, M Montazerolzohour… - Proceedings Title: 2012 …, 2012 - ieeexplore.ieee.org
The main role of encryption algorithms is to keep devises safe from attack. Using the best
and more efficient algorithm for a device according to its storage and amount of data transfer …

Finding the best FPGA implementation of the DES algorithm to secure smart cards

K Dichou, V Tourtchine… - 2015 4th International …, 2015 - ieeexplore.ieee.org
Smart cards are often used in different applications which require strong security protection
and authentication; such as corporate organization, government, banks etc. its popularity is …

An ECC-based secure EMR transmission system with data leakage prevention scheme

KL Tsai, FY Leu, JS Tan - International Journal of Computer …, 2016 - Taylor & Francis
In this paper, we propose a secure electronic medical record (EMR) service system, named
the ECC-based Secure EMR Transmission System (ESEMRT for short) which employs a …

Combining encryption methods in multipurpose smart card

M Savari, M Montazerolzohour… - Proceedings Title: 2012 …, 2012 - ieeexplore.ieee.org
Smart cards have many applications such as health, ID verification and access control,
electronic purse card, banking card, payphone card, passport card and license card. Since …

An ECDSA signature scheme designs for PBOC 2.0 specifications

Y Zhang, W Zhou - 2012 9th International Conference on Fuzzy …, 2012 - ieeexplore.ieee.org
The RSA algorithm was recognized as the asymmetric encryption signature algorithm in
PBOC2. 0 specifications. Since the Elliptic Curve Cryptosystem (ECC) is popular in smart …

[PDF][PDF] Multipurpose Smart Card Using Advanced Encryption Standard Algorithm

A Nusrath - International Journal of Emerging Technologies in …, 2015 - academia.edu
Smart card is one of the greatest achievements in the world of information technology. Smart
cards have many applications such as health, ID verification and access control, electronic …

A Comprehensively Secure Smart card access controls

S Alazmi, AR Khan, Q Yu - 2018 21st Saudi Computer Society …, 2018 - ieeexplore.ieee.org
The smart card has been used in many applications for access controls, such as banking,
identification, transportation, telecommunication, health care and electronic payments. Smart …

[PDF][PDF] A DESIGN AND IMPLEMENTATION OF HYBRID SECURED PROTOCOL FOR BIOMETRIC IMAGES

M Gobi, MR Sridevi - researchgate.net
in the modern world, security threat is a prime issue for authentication and encryption is one
of the best alternative ways to ensure security. Moreover, many image encryption schemes …

An Implementation of Hybrid Cryptographic Protocol For Facial Image Security

M Gobi, R Sridevi - International Journal of Current Research in Science …, 2015 - crst.gfer.org
Security is a prime concern for user authentication and there are so many methods to ensure
the user authentication. One of the available methods is biometric authentication. Encryption …