Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,064,074 papers from all fields of science
Search
Sign In
Create Free Account
Punched card input/output
Known as:
Cardpunch
, Card reader (punched card)
, Punch card reader
Expand
A computer punched card reader or just computer card reader is a computer input device used to read executable computer programs and data from…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
CDC 3000
CDC 6000 series
Computer program
Computer programming in the punched card era
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
A TECHNOLOGICAL FRAMEWORK FOR TRANSPARENT E-VOTING SOLUTION IN THE NIGERIAN ELECTORAL SYSTEM
G. Uzedhe
,
J. Okhaifoh
2016
Corpus ID: 54983227
This paper presents the design of a technological framework for electronic voting (E-voting) systems in Nigeria. The traditional…
Expand
2015
2015
BIOMETRIC VOTING TECHNOLOGY AND THE 2015 GENERAL ELECTIONS IN NIGERIA
Chikodiri Nwangwu
2015
Corpus ID: 157718634
2015
2015
Effective Modeling for a Distance-Based Fare Structure with a Time-Expanded Network
Donghyung Yook
,
K. Heaslip
2015
Corpus ID: 42034400
This study addresses the appropriateness of a passenger assignment model for a distance-based fare structure that recently has…
Expand
Highly Cited
2009
Highly Cited
2009
Optimised to Fail: Card Readers for Online Banking
S. Drimer
,
S. Murdoch
,
Ross J. Anderson
Financial Cryptography
2009
Corpus ID: 6184361
The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online…
Expand
2006
2006
On-Chip Voltage Regulator Protecting Against Power Analysis Attacks
V. Telandro
,
E. Kussener
,
A. Malherbe
,
H. Barthélemy
49th IEEE International Midwest Symposium on…
2006
Corpus ID: 2275297
The on-chip voltage regulator proposed in this paper has been specifically developed for smart cards. Its purpose is to protect…
Expand
2004
2004
Formal Specification of Security-relevant Properties of User-Interfaces
Bernhard Beckert
,
Gerd Beuster
2004
Corpus ID: 16618893
When sensitive information is exchanged with the user of a computer system, the security of the system’s user interface must be…
Expand
2002
2002
Verified Formal Security Models for Multiapplicative Smart Cards
G. Schellhorn
,
W. Reif
,
Axel Schairer
,
P. Karger
,
V. Austel
,
David C. Toll
Journal of computing and security
2002
Corpus ID: 18101736
We present two generic formal security models for operating systems of multiapplicative smart cards. The models formalize the…
Expand
Highly Cited
2000
Highly Cited
2000
Verification of a Formal Security Model for Multiapplicative Smart Cards
G. Schellhorn
,
W. Reif
,
Axel Schairer
,
P. Karger
,
V. Austel
,
David C. Toll
European Symposium on Research in Computer…
2000
Corpus ID: 6400299
We present a generic formal security model for operating systems of multiapplicative smart cards. The model formalizes the main…
Expand
Highly Cited
1981
Highly Cited
1981
First General-Purpose Electronic Computer
A. Burks
,
A. Burks
Annals of the History of Computing
1981
Corpus ID: 14205498
The conception, development, and design of the ENIAC are presented in the context of a causal history. Early influences…
Expand
1965
1965
A Computer Oriented Mechanical Design System
L. F. Knappe
Design Automation Conference
1965
Corpus ID: 38564678
The COMMEND (Computer-Aided Mechanical Engineering Design) System is being developed in the Advanced Technology Department at the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE