2017 40th International Conference on Telecommunications and Signal Processing (TSP) 2017
DOI: 10.1109/tsp.2017.8075931
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and secure access control system based on programmable smart cards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…The mechanism for securing data using dynamic keys and access conditions is still possible for others to know, for example, by performing authentication with all possible combinations of the six-byte key and trying to analyze the pattern of keys that have been successfully identified. Therefore, in further research, it is necessary to develop data security techniques using encryption algorithms such as DES [14] and 3DES [15] or hardware such as the Secure Access Module (SAM) [12] to increase the security of data stored on smart cards.…”
Section: E Writing Data Using the Key Amentioning
confidence: 99%
See 1 more Smart Citation
“…The mechanism for securing data using dynamic keys and access conditions is still possible for others to know, for example, by performing authentication with all possible combinations of the six-byte key and trying to analyze the pattern of keys that have been successfully identified. Therefore, in further research, it is necessary to develop data security techniques using encryption algorithms such as DES [14] and 3DES [15] or hardware such as the Secure Access Module (SAM) [12] to increase the security of data stored on smart cards.…”
Section: E Writing Data Using the Key Amentioning
confidence: 99%
“…In this case, the card owner must prove their knowledge of the private key stored on the smart card. Next, the private key is mapped to the public user ID [12]. Most of the studies that have been conducted by several previous researchers only focus on security in In this study, a data security technique using dynamic keys is proposed by changing the key and access conditions on the smart card based on the UID of each smart card.…”
Section: Introductionmentioning
confidence: 99%