Buy a Coke, Copy a Class Lesson, Oh, and Open a Door

Zalud, Bill
September 2010
Security: Solutions for Enterprise Security Leaders;Sep2010, Vol. 47 Issue 9, p74
Trade Publication
The article reports on the security applications of a smart card, a device that includes an embedded integrated circuit in the U.S. Applications include controlling physical access, authenticating a person's identity and determining the appropriate level of access. The article offers information on the two categories of smart cards.


Related Articles

  • Weighing Contactless Cost.  // Security: Solutions for Enterprise Security Leaders;Apr2006, Vol. 43 Issue 4, p32 

    The article examines the advantages of a contactless smart card access control system. Contactless systems offers advantages in terms of convenience and cost-efficiency. They also offer a high level of vandal-resistance when compared with a keypad or swipe card reader. In addition, with...

  • So, What's Keeping You from Buying?  // Security: Solutions for Enterprise Security Leaders;May2007, Vol. 44 Issue 5, p40 

    The article discusses the proliferation of applications that support both contact and contactless smart card technology. Contact technology is still the first choice for information technology-related use due to its ability to support PKI and digital signatures. However, smart cards allow chief...

  • Govt. braces for key security standard. Messmer, Ellen // Network World;2/28/2005, Vol. 22 Issue 8, p7 

    The article focuses on the issuance of a smart card standard by the National Institute of Standards and Technology that will be the basis for products that give federal employees and contractors secure access to networks and buildings. President George W. Bush imposed the deadline last August in...

  • An 8 Step ID Card Plan.  // Security: Solutions for Enterprise Security Leaders;Apr2006, Vol. 43 Issue 4, p64 

    The article discusses steps to put a dual-use identification smart card system to work. First is to assess security policies and levels. Second is to hire a champion to drive the transition. Third is to develop an implementation plan. Fourth is to select the access technology. Fifth is to select...

  • ACCESS CONTROL: STATE of the MARKET. Cager, Russ // SDM: Security Distributing & Marketing;Feb2007, Vol. 37 Issue 2, p62 

    The article presents the outlook for the access control marketplace in 2007. Security dealers, systems integrators, manufacturers, and distributors express optimism for the access control sales. The Federal Information Processing Standard (FIPS) 201 for smart cards was cited by manufacturers as...

  • Selective Timestamp-Nonce Based Authentication Scheme. Yi-Ming Chen; Wei-Chen Wu; Horng-Twu Liaw // International Journal of Security & Its Applications;Jan2013, Vol. 7 Issue 1, p95 

    In this paper, we improve an effcient and complete remote user authentication scheme and propose an adaptive timestamp-nonce based authentication scheme using portable stor- age devices. Compared with other smart card-based, timestamp-based and nonce-based schemes, our scheme achieves more...

  • HID Global.  // Security: Solutions for Enterprise Security Leaders;Jan2008, Vol. 45 Issue 1, p88 

    The article provides information on the products and services offered by HID Global Corp. in the U.S. The firm, regarded as leader in providing solutions for the delivery of secure identity, offers proximity and smart card technologies to customers for physical access control. Its series of...

  • Dynamic Identity Based Authentication Protocol for Two-Server Architecture. Sood, Sandeep K. // Journal of Information Security;Oct2012, Vol. 3 Issue 4, p326 

    Most of the password based authentication protocols make use of the single authentication server for user's authentication. User's verifier information stored on the single server is a main point of susceptibility and remains an attractive target for the attacker. On the other hand, multi-server...

  • Study on A Secure Remote User Authentication Scheme Using Smart Cards. Jin Qiuyan; Kwangwoo Lee; Dongho Won // International Journal of Security & Its Applications;Mar2013, Vol. 7 Issue 2, p105 

    Remote user authentication scheme is a kind of way to authenticate the communication parties who transmit messages through an insecure channel. Researchers in this area have proposed some approaches during the last couple of decades. Unfortunately, most of them are proved to be insecure against...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics