Combinational logic soft error correction
S Mitra, M Zhang, S Waqas, N Seifert… - 2006 IEEE …, 2006 - ieeexplore.ieee.org
We present two techniques for correcting radiation-induced soft errors in combinational logic-
error correction using duplication, and error correction using time-shifted outputs. Simulation …
error correction using duplication, and error correction using time-shifted outputs. Simulation …
A secure end-to-end proximity NFC-based mobile payment protocol
S Bojjagani, VN Sastry - Computer Standards & Interfaces, 2019 - Elsevier
Abstract Near Field Communication (NFC) is one of the fast-growing technologies related to
proximity-based mobile payments. In this paper, a secure NFC-enabled payment model that …
proximity-based mobile payments. In this paper, a secure NFC-enabled payment model that …
Challenge-response mutual authentication protocol for EMV contactless cards
O Al-Maliki, H Al-Assam - Computers & Security, 2021 - Elsevier
Abstract Europay MasterCard and Visa (EMV) is the most popular payment protocol with
almost 7.1 billion EMV based credit and debit cards around the world. This payment protocol …
almost 7.1 billion EMV based credit and debit cards around the world. This payment protocol …
Towards more secure EMV purchase transactions: A new security protocol formally analyzed by the Scyther tool
EMV is the protocol implemented to secure the communication, between a client's payment
device and a merchant's payment device, during a contact or an NFC purchase transaction …
device and a merchant's payment device, during a contact or an NFC purchase transaction …
The EMV Payment System: Is It Reliable?
EMV (Europay MasterCard Visa) is the technical international protocol implemented to
secure the communication, between a client's payment device and a PoS (Point of Sale) …
secure the communication, between a client's payment device and a PoS (Point of Sale) …
I've Got You, Under My Skin: Biohacking Augmentation Implant Forensics
Recently, people have become interested in embedding technology in their bodies to
augment themselves with new abilities. For example, a person may embed a chip in their …
augment themselves with new abilities. For example, a person may embed a chip in their …
Enhanced and secured random number generation for eUASBP
Authentication is needed for vital applications around the world. Applications that deal with
sensitive information need to be kept secret through anyone type of authentication mode …
sensitive information need to be kept secret through anyone type of authentication mode …
Impact of Internal Control, Cybersecurity Risk, and Competitive Advantage on Retail Cybersecurity Budget
S Pfanstiel - 2022 - search.proquest.com
Retail organizations are driven to improve security posture for many reasons, including
meeting financial regulation requirements, mitigating threats of data breach, and …
meeting financial regulation requirements, mitigating threats of data breach, and …
FINGERPRINTS TO AUTHENTICATE TRANSACTIONS IN CONTACTLESS CARDS.
SJ Ibrahima, AB Al-Khalil - Science Journal of University of …, 2023 - search.ebscohost.com
The contactless bank card is a replica of the old fashion payment methods. The contactless
card saves the customer a lot of time and effort because the cardholder can tap the card on …
card saves the customer a lot of time and effort because the cardholder can tap the card on …
FINGERPRINTS TO AUTHENTICATE TRANSACTIONS IN CONTACTLESS CARDS
AB Al-Khalil - Science Journal of University of Zakho, 2023 - sjuoz.uoz.edu.krd
The contactless bank card is a replica of the old fashion payment methods. The contactless
card saves the customer a lot of time and effort because the cardholder can tap the card on …
card saves the customer a lot of time and effort because the cardholder can tap the card on …