So, What's Keeping You from Buying?
- Memory devices shrink to fit smaller spaces. Nass, Richard // Portable Design;Jan2004, Vol. 10 Issue 1, p32
Points out that one of the simplest methods of removable storage is in the form of a smart card. Addition of a member to Infineon Technologies' 32-bit security controller 88 family; Advantage of allowing smart-card makers ship products with customize software configurations in just two weeks.
- Seven top security tips. // Communications News;Aug2006, Vol. 43 Issue 8, p8
The article presents mobile security tips for securing employees' notebooks. These include always making sure that the notebook case, including all contents are present before leaving a plane, taxi or train and creating a password that is difficult enough to crack. A mixture of characters,...
- Smart Card Connectors Add Security for Consumers. Bourin, Jean-Michel // ECN: Electronic Component News;Jun2011, Vol. 55 Issue 7, p20
The article focuses on the use of smart card connectors, in which they provide enhanced security for businesses and consumers against identity theft, computer piracy and viruses.
- AUTHENTICATED AND SECURE El-GAMAL CRYPTOSYSTEM OVER ELLIPTIC CURVES. Kakish, Malek Jakob // International Journal of Research & Reviews in Applied Sciences;2012, Vol. 10 Issue 2, p306
Information technologies plays a major role in our information society, thus it is important to protect it against many kinds of threats or attacks which may lead to lose of money, or lose of reputation and thus destroy businesses. The El-Gamal public key cryptosystem over elliptic curves is...
- Chip card introductions stress added value. Kutler, Jeffrey // American Banker;11/6/1998, Vol. 163 Issue 214, p10
Focuses on the smart card product introductions at the Cartes '98, the annual smart card trade show in Paris, France. Emphasis on value-added services; Security and loyalty programs as additional features in smart cards; Other highlights of the trade show.
- Token. // Network Dictionary;2007, p490
A definition of the term "Token" is presented. In security context, a token or security token refers to a physical device, such as a special smart card, that together with something that a user knows, such as a PIN, will enable authorized access to a computer system or network.
- An 8 Step ID Card Plan. // Security: Solutions for Enterprise Security Leaders;Apr2006, Vol. 43 Issue 4, p64
The article discusses steps to put a dual-use identification smart card system to work. First is to assess security policies and levels. Second is to hire a champion to drive the transition. Third is to develop an implementation plan. Fourth is to select the access technology. Fifth is to select...
- Govt. braces for key security standard. Messmer, Ellen // Network World;2/28/2005, Vol. 22 Issue 8, p7
The article focuses on the issuance of a smart card standard by the National Institute of Standards and Technology that will be the basis for products that give federal employees and contractors secure access to networks and buildings. President George W. Bush imposed the deadline last August in...
- Buy a Coke, Copy a Class Lesson, Oh, and Open a Door. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Sep2010, Vol. 47 Issue 9, p74
The article reports on the security applications of a smart card, a device that includes an embedded integrated circuit in the U.S. Applications include controlling physical access, authenticating a person's identity and determining the appropriate level of access. The article offers information...