Zobrazeno 1 - 10
of 28
pro vyhledávání: '"magnetic stripe card"'
Publikováno v:
Techno.Com, Vol 23, Iss 1, Pp 284-293 (2024)
Penggunaan kartu magnetic stripe pada wahana permainan rentan terhadap akses yang tidak sah, seperti skimming, yang dapat merugikan pengelola dan penyedia wahana. Penetration testing merupakan metode yang dapat digunakan untuk mengidentifikasi dan ek
Externí odkaz:
https://doaj.org/article/8bae9645dd884b80942f09f18bc7787a
Publikováno v:
Novel Optical Systems, Methods, and Applications XXIV.
A system for measuring the orientation and power of sphero-cylindrical lenses has been developed. The system attempts to minimize the need for specialized equipment and training and instead relies on the ubiquitous cell phone camera, a magnetic strip
Autor:
Sakamoto, Kensei
Publikováno v:
流通科学研究 = Journal of Faculty of Business , Marketing and Distribution. 17(1):87-89
Publikováno v:
Applications and Techniques in Information Security ISBN: 9789811508707
ATIS
ATIS
Recently, criminals frequently utilize logical attacks to Automated Teller Machines (ATMs) and financial institutes’ networks to steal cash. An ATM security measure called “Control Command Verification” has been proposed to cope with the issues
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6175dae3e26a1338f883c641f33026b8
https://doi.org/10.1007/978-981-15-0871-4_3
https://doi.org/10.1007/978-981-15-0871-4_3
Publikováno v:
DEStech Transactions on Computer Science and Engineering.
Analyze the management vulnerabilities and technology vulnerabilities of current bank cards firstly, explain the technical features of the magnetic stripe and memory chip bank card, and disclose the method probably used by criminals while attacking.
Publikováno v:
Applied Mechanics and Materials. :357-360
RFID has been widely used in high security applications due to its contactless characteristic and security mechanism, such as e-ticket, e-money, e-key and so on. Since magnetic stripe card and traditional Mifare RFID card can be broken, it is a gener
Autor:
Bruce Schneier
Publikováno v:
Secrets and Lies ISBN: 9781119183631
Secrets and Lies
Secrets and Lies
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::68ef7ffd74f45bb3e5da08c25f7d7fcf
https://doi.org/10.1002/9781119183631.ch20
https://doi.org/10.1002/9781119183631.ch20
Autor:
Nadia Al-Qurashi, Adel Ismail Al-Alawi
Publikováno v:
Review of Business Information Systems (RBIS). 9:73-92
Within the improvement of Information Technology era, many business enterprises, academia institutions and banks in various regions around the world are enthusiastic and looking into the future by producing an all-in-one smart card with Europay, Mast
Autor:
Johnny Bengtsson
Publikováno v:
Digital Evidence and Electronic Signature Law Review
Conference paper by Johnny Bengtsson
Autor:
A. A. Ajisafe, H. Lasisi
Publikováno v:
2012 2nd International Conference on Advances in Computational Tools for Engineering Applications (ACTEA).
Access control has been a great concern in this Information and Communication Technology (ICT) era. The need to control access to certain information and resources has been taken seriously by the ICT community. This paper believes that no single secu