Showing 1 - 10 of 84
lifestyle. These techniques are also used for banknotes, as more secure and reliable designs are needed, which the public can … lifecycle: the design of banknotes and security features, the detection of illegal reproductions, and the assessment of …, emotions and sustained attention on the different areas of interest on the banknote, as described in the different perception …
Persistent link: https://www.econbiz.de/10014000059
In recent years, payment systems have benefited from technological developments that have accelerated their evolution and adaptation to user needs. Payment systems ultimately depend on central bank money, and the debate about the advisability of updating the different ways of representing this...
Persistent link: https://www.econbiz.de/10014000070
This study examines the influence of personality factors and attitudes toward consumers' willingness to knowingly purchase counterfeit luxury brands. Convenience sampling method was employed and a self administered questionnaire was distributed to students in a large Australian university. A...
Persistent link: https://www.econbiz.de/10009434812
This paper describes a number of techniques for GNSS navigation message authentication. A detailed analysis of the … security facilitated by navigation message authentication is given. The analysis takes into consideration the risk of critical … cryptographic authentication schemes for navigation data authentication. These authentication schemes provide authenticity and …
Persistent link: https://www.econbiz.de/10009438385
websites, to Trojans that monitor a customer’s account log on process that captures authentication details that are later … is to present a conceptual model for authentication, data entry and transaction verification. It is suggested that the … to an attacker. The model is based on a graphical authentication application previously developed called Authentigraph. …
Persistent link: https://www.econbiz.de/10009440800
reader’s signals. Along thisvein, a class of ultralightweight RFID authentication protocols has been designed,which uses only …
Persistent link: https://www.econbiz.de/10009461313
(Class1). To protect users and organization we are proposing an enhanced RFID mutual authentication scheme. In this protocol … we use authentication based on shared unique parameters as a method to protect privacy. This protocol will be capable of …
Persistent link: https://www.econbiz.de/10009483920
ensure the data privacy of a tag. The framework will use a sanitization technique with a mutual authentication in the reader … stop execution of the code in the RFIF system. Here shared unique parameters are used for authentication. It will be …
Persistent link: https://www.econbiz.de/10009483982
RFID tags. Authentication protocols can be a possible solution to secure RFID communications.In this thesis, we consider … RFID authentication protocols based on symmetric key cryptography. We identify the security and privacy requirements for an … RFID system. We present four protocols in this thesis. First, we propose a lightweight authentication protocol for typical …
Persistent link: https://www.econbiz.de/10009484555
In a history-based trust-management system, users and service providers use information about past transactions to make trust-based decisions concerningcurrent transactions. One category of such systems is represented by the reputation systems. However, despite the growing body of experience in...
Persistent link: https://www.econbiz.de/10009430549