Are Smart Cards Right for You?

Boriskin, Peter
March 2005
Security: Solutions for Enterprise Security Leaders;Mar2005, Vol. 42 Issue 3, p39
Trade Publication
Reports on the factors to consider before adopting smart card technology in the U.S. Ability to bring physical access and information technology users onto a single authentication point; Provision of access to databases and locations; Importance of ensuring the resistance of the technology to duplication and corruption.


Related Articles

  • Flash Memory to Speed Up Hard Drives. Albro, Edward N.; Jacobi, Jon L. // PCWorld;Sep2005, Vol. 23 Issue 9, p20 

    This article reports on the introduction of solid-state-memory discs, which use flash memory to supplement or replace hard drives for faster boot times and longer battery life. Samsung is working on two types of products: pure solid-state-memory discs and hybrid drives that combine traditional...

  • GP Net: Tip of the week - NT4 and USBs. James, Richard // GP: General Practitioner;5/10/2004, p54 

    The article presents advice to transfer files between NT4 computers using a USB flash memory card. It is a given that NT4 cannot access USB ports. So you are deprived of the benefit of transferring larger files between NT4 machines with a USB port and your home computer by a USB flash memory...

  • London borough creates data standard to match records across legacy databases. Hadfield, William // Computer Weekly;3/21/2006, p9 

    The article informs that the London Borough of Hammersmith and Fulham is ready for the future introduction of smartcards for accessing public services, after spending five years matching customer information held on seven different databases. The council has spent £900,000 matching data held...

  • RARITAN EXPANDS SMART CARD SOLUTION FOR SECURE ACCESS.  // Computer Workstations;Apr2009, Vol. 22 Issue 4, p2 

    The article reports on the move of Raritan to expand its smart card solution portfolio to provide data centers with a level of security for accessing and managing equipment. The company presents the new Dominion KX II Smart Card Reader Solution, which enables card readers to be placed where they...

  • AUTHENTICATED AND SECURE El-GAMAL CRYPTOSYSTEM OVER ELLIPTIC CURVES. Kakish, Malek Jakob // International Journal of Research & Reviews in Applied Sciences;2012, Vol. 10 Issue 2, p306 

    Information technologies plays a major role in our information society, thus it is important to protect it against many kinds of threats or attacks which may lead to lose of money, or lose of reputation and thus destroy businesses. The El-Gamal public key cryptosystem over elliptic curves is...

  • Pocket computer's potential power.  // Accountancy;May90, Vol. 105 Issue 1161, p128 

    This article focuses on the vast and growing industrial and commercial applications potential of smart cards as of May 1990. The proliferation of systems based on the magnetic strip technology which preceded the smart card has done much to slow down its commercial progress. But these factors are...

  • SmartMetric Points to a New World of Verification. Sausner, Rebecca // Bank Technology News;Jul2006, Vol. 19 Issue 7, p13 

    The article reports on SmartMetric having a breakthrough on smart card technology. The company has made smart cards that have both fingerprint sensors and card readers built into card. Moreover, the technology has potential applications in payments and physical and network security as it acts as...

  • A Storage Question. Mitra, Kushan // Business Today;8/24/2008, Vol. 17 Issue 17, p185 

    The article focuses on the issue pertaining to the development of several consumer electronic products featuring the innovation of easily removable storage. The rise of the micro-Secure Digital (SD) card format found in several mobile phones is impressive because it is small. The amount of data...

  • Chapter: 10 External Hashing for Online Dictionary Search.  // Foundations & Trends in Theoretical Computer Science;2006, Vol. 2 Issue 4, p386 

    Chapter Ten of the manuscript "Algorithms and Data Structures for External Memory," by Jeffrey Scott Vitter, is presented. The chapter focuses on external hashing for online dictionary search. According to the chapter, there are two main types of external memory (EM) dictionaries, namely hashing...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics