Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,351,008 papers from all fields of science
Search
Sign In
Create Free Account
Smart card
Known as:
Chip card
, Smart Card Web Server
, Smart Kartela
Expand
A smart card, chip card, or integrated circuit card (ICC) is any pocket-sized card that has embedded integrated circuits. Smart cards are made of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Authentication
Automatic identification and data capture
Bingo voting
BitLocker
Expand
Broader (1)
Ubiquitous computing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Smart mobility management for D2D communications in 5G networks
Osman N. C. Yilmaz
,
Zexian Li
,
+4 authors
C. Wijting
IEEE Wireless Communications and Networking…
2014
Corpus ID: 7847035
Direct device-to-device (D2D) communications is regarded as a promising technology to provide low-power, high-data rate and low…
Expand
Highly Cited
2010
Highly Cited
2010
New dynamic ID authentication scheme using smart cards
Jia-Lun Tsai
,
Tzong-Chen Wu
,
Kuo-Yu Tsai
International Journal of Communication Systems
2010
Corpus ID: 13539873
Recently, Yoon et al. and Wang et al. independently proposed a dynamic ID authentication scheme and claimed that their schemes…
Expand
Highly Cited
2005
Highly Cited
2005
Improvement of Chien et al.'s remote user authentication scheme using smart cards
Sung-Woon Lee
,
Hyun-Sung Kim
,
K. Yoo
Comput. Stand. Interfaces
2005
Corpus ID: 26738179
Highly Cited
2004
Highly Cited
2004
Security of Chien et al.'s remote user authentication scheme using smart cards
Chien-Lung Hsu
Comput. Stand. Interfaces
2004
Corpus ID: 38547679
Highly Cited
2004
Highly Cited
2004
Efficient password authenticated key agreement using smart cards
Wen-Shenq Juang
Computers & security
2004
Corpus ID: 11579889
Highly Cited
2003
Highly Cited
2003
Cryptanalysis of a modified remote user authentication scheme using smart cards
K. Leung
,
Lee-Ming Cheng
,
A. Fong
,
Chi-Kwong Chan
IEEE Trans. Consumer Electron.
2003
Corpus ID: 206631417
In this paper, the security of a modified remote user authentication scheme proposed by Shen, Lin, and Hwang is analyzed. We show…
Expand
Highly Cited
2003
Highly Cited
2003
A remote user authentication scheme using smart cards with forward secrecy
A.K.Awasthi
,
Sunder Lal
IEEE Trans. Consumer Electron.
2003
Corpus ID: 34328412
In 2000, Hwang and Li proposed a new remote user authentication scheme using smart cards. Chan and Chang showed that the…
Expand
Highly Cited
2003
Highly Cited
2003
A user friendly remote authentication scheme with smart cards
Shyi-Tsong Wu
,
Bin-Chang Chieu
Computers & security
2003
Corpus ID: 33553150
Highly Cited
2002
Highly Cited
2002
Parallel scalar multiplication on general elliptic curves over Fp hedged against Non-Differential Side-Channel Attacks
Wieland Fischer
,
Christophe Giraud
,
E. Knudsen
,
Jean-Pierre Seifert
IACR Cryptology ePrint Archive
2002
Corpus ID: 16995694
. Abstract. For speeding up elliptic curve scalar multiplication and making it secure against side-channel attacks such as timing…
Expand
Highly Cited
1999
Highly Cited
1999
Printing Process Suitable for Reel-to-Reel Production of High-Performance Organic Transistors and Circuits
J. Rogers
,
Zhenan Bao
,
A. Makhija
,
P. Braun
Advances in Materials
1999
Corpus ID: 17100558
cause appropriate compounds now exist for many types of devices, research has expanded to include patterning methods that can…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE