TITLE

From the Front Door to the Plant Floor

PUB. DATE
October 2004
SOURCE
Security: Solutions for Enterprise Security Leaders;Oct2004, Vol. 41 Issue 10, p26
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
This article presents information on smart card technology. Smart cards can protect employees, assets, data and processes from intruders intent on theft, damage and destruction. The data capacity of smart cards means they can hold multiple biometric templates, including fingerprints and iris scans. Smart cards are more convenient more durable and, because they can't be duplicated, more secure. Smart cards used for identification and access can also be used to log onto a PC or workstation to perform tasks, access data or manipulate key building systems or manufacturing processes.
ACCESSION #
14635829

 

Related Articles

  • A COMPOSITE FINGERPRINT TEMPLATE FROM MULTIPLE IMPRESSIONS CALLED FINGERPRINT MOSAICKING SCHEME. Devireddy, Srinivasa Kumar // Computer Science & Telecommunications;2011, Vol. 30 Issue 1, p3 

    A fingerprint-based verification system has two distinct phases of operation: (i) the enrollment phase, during which multiple impressions of a fingerprint are acquired and stored in the database as templates, and (ii) the authentication phase, where the query image of a user is matched against...

  • Bipartite modular multiplication with twice the bit-length of multipliers. Yoshino, Masayuki; Okeya, Katsuyuki; Vuillaume, Camille // International Journal of Information Security;Feb2009, Vol. 8 Issue 1, p13 

    This paper presents a new technique to compute 2 â„“-bit bipartite multiplications with â„“-bit bipartite multiplication units. Low-end devices such as smartcards are usually equipped with crypto-coprocessors for accelerating the heavy computation of modular multiplications; however,...

  • SUCCESS STORIES IN SMART CARDS & BIOMETRICS. Fngebretson, Joan // SDM: Security Distributing & Marketing;Sep2004, Vol. 34 Issue 9, p54 

    This article provides information on several successful installations of security systems that have incorporated cutting edge technologies like smart cards and biometrics to provide an extra level of security for clients. The Protection Bureau of Exton, Pennsylvania, installed the biometric...

  • The CISO Rises: How Is It Working Out? Richards, Kathleen // Information Security;Oct2015, Vol. 17 Issue 8, p10 

    The article discusses the importance of information security to protect the customer's data in the company. It highlights the use of chip cards and personal identification number (PIN) or signatures to enhance information security particularly in the telecommunication company. It examines the...

  • Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems. Mishra, Dheerendra; Mukhopadhyay, Sourav; Chaturvedi, Ankita; Kumari, Saru; Khan, Muhammad // Journal of Medical Systems;Jun2014, Vol. 38 Issue 6, p1 

    Remote user authentication is desirable for a Telecare Medicine Information System (TMIS) for the safety, security and integrity of transmitted data over the public channel. In 2013, Tan presented a biometric based remote user authentication scheme and claimed that his scheme is secure....

  • Ministers warned ID scheme too complex. Huber, Nick // Computer Weekly;11/9/2004, p12 

    The article reports that the British government's £3.1bn national identity (ID) card scheme is too complex and the biometric technology it will be based on has not been tested widely enough. Steve Everhard, chief executive of smartcard specialist Multos, said the British government's plans...

  • Technology And Organization: Strategic Intersections and Asymptotes. Davis, Christopher J. // Business Journal for Entrepreneurs;2011, Vol. 2011 Issue 3, p105 

    Although it is commonly assumed or hoped that information systems can be aligned or matched with organizational needs, notions of match, alignment and fit are poorly defined. Nor is the hoped for alignment apparently happening. We argue that it is not in general possible to state an...

  • Session Keys Management System between Smart Card and Machine. Thida, Moe // Proceedings of World Academy of Science: Engineering & Technolog;Feb2009 Supplement, Vol. 50, p1191 

    Although smart cards are becoming in an increasing number of applications, there is small literature of implementation issues for smart cards. Smart cards are used in many applications that require a tamper resistant area. Therefore, smart cards are used that Cryptography has to provide...

  • WHAT YOUR BUSINESS SHOULD KNOW ABOUT INTERNET SECURITY. Mcguire, Brian L.; Roser, Sherry N. // Strategic Finance;Nov2000, Vol. 82 Issue 5, p50 

    The article focuses on the importance of Internet security for companies engaging in electronic commerce. A discussion is presented about the effects of failed Internet security on company finances and methods of identifying threats online. The development of a smart card for authorized access...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics