Pen computing: a technology overview and a vision
ACM SIGCHI Bulletin
A Flexible User Authentication Scheme for Multi-server Internet Services
ICN '01 Proceedings of the First International Conference on Networking-Part 1
Secure remote user authentication scheme using bilinear pairings
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
New authentication scheme based on a one-way hash function and diffie-hellman key exchange
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Robust secret key based authentication scheme using smart cards
PCM'05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II
Robust and simple authentication protocol for secure communication on the web
ICWE'05 Proceedings of the 5th international conference on Web Engineering
Research: Remote login authentication scheme based on a geometric approach
Computer Communications
Hi-index | 0.09 |
The growing use of IC memory cards, with their small size and low power consumption, in key roles in all sorts of handheld equipment is discussed. Three events that have propelled the credit-card-sized descendants of the original battery-packed memory cards are discussed. They are the development of a standard for 68-pin personal computer cards, known as PC cards, that allows them to act as peripherals, such as modems and network ports, as well as storage devices; the development of flash-type nonvolatile memory chips of very high capacity; and the emergence of palmtop and notebook computers