So, What's Keeping You from Buying?

May 2007
Security: Solutions for Enterprise Security Leaders;May2007, Vol. 44 Issue 5, p40
Trade Publication
The article discusses the proliferation of applications that support both contact and contactless smart card technology. Contact technology is still the first choice for information technology-related use due to its ability to support PKI and digital signatures. However, smart cards allow chief security officers to get their program up and running with no coordination to other departments for atleast the next 15 years.


Related Articles

  • Memory devices shrink to fit smaller spaces. Nass, Richard // Portable Design;Jan2004, Vol. 10 Issue 1, p32 

    Points out that one of the simplest methods of removable storage is in the form of a smart card. Addition of a member to Infineon Technologies' 32-bit security controller 88 family; Advantage of allowing smart-card makers ship products with customize software configurations in just two weeks.

  • Seven top security tips.  // Communications News;Aug2006, Vol. 43 Issue 8, p8 

    The article presents mobile security tips for securing employees' notebooks. These include always making sure that the notebook case, including all contents are present before leaving a plane, taxi or train and creating a password that is difficult enough to crack. A mixture of characters,...

  • Smart Card Connectors Add Security for Consumers. Bourin, Jean-Michel // ECN: Electronic Component News;Jun2011, Vol. 55 Issue 7, p20 

    The article focuses on the use of smart card connectors, in which they provide enhanced security for businesses and consumers against identity theft, computer piracy and viruses.

  • AUTHENTICATED AND SECURE El-GAMAL CRYPTOSYSTEM OVER ELLIPTIC CURVES. Kakish, Malek Jakob // International Journal of Research & Reviews in Applied Sciences;2012, Vol. 10 Issue 2, p306 

    Information technologies plays a major role in our information society, thus it is important to protect it against many kinds of threats or attacks which may lead to lose of money, or lose of reputation and thus destroy businesses. The El-Gamal public key cryptosystem over elliptic curves is...

  • Chip card introductions stress added value. Kutler, Jeffrey // American Banker;11/6/1998, Vol. 163 Issue 214, p10 

    Focuses on the smart card product introductions at the Cartes '98, the annual smart card trade show in Paris, France. Emphasis on value-added services; Security and loyalty programs as additional features in smart cards; Other highlights of the trade show.

  • Token.  // Network Dictionary;2007, p490 

    A definition of the term "Token" is presented. In security context, a token or security token refers to a physical device, such as a special smart card, that together with something that a user knows, such as a PIN, will enable authorized access to a computer system or network.

  • An 8 Step ID Card Plan.  // Security: Solutions for Enterprise Security Leaders;Apr2006, Vol. 43 Issue 4, p64 

    The article discusses steps to put a dual-use identification smart card system to work. First is to assess security policies and levels. Second is to hire a champion to drive the transition. Third is to develop an implementation plan. Fourth is to select the access technology. Fifth is to select...

  • Govt. braces for key security standard. Messmer, Ellen // Network World;2/28/2005, Vol. 22 Issue 8, p7 

    The article focuses on the issuance of a smart card standard by the National Institute of Standards and Technology that will be the basis for products that give federal employees and contractors secure access to networks and buildings. President George W. Bush imposed the deadline last August in...

  • Buy a Coke, Copy a Class Lesson, Oh, and Open a Door. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Sep2010, Vol. 47 Issue 9, p74 

    The article reports on the security applications of a smart card, a device that includes an embedded integrated circuit in the U.S. Applications include controlling physical access, authenticating a person's identity and determining the appropriate level of access. The article offers information...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics