Secure authentication process in smart cards

Abstract

The application of smart cards and its fraudulent manipulation by software, hardware or telecommunication appears to be a major concern. Security breaches of smart cards, hacking into the system and creating duplicates of the cards have to be rectified. In this paper we propose an approach to design a more secure two-level authentication process that uses… (More)

Topics

6 Figures and Tables

Slides referencing similar topics