Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Prof)
Proposed System
Server : Client DB Ration Card Get Data
Passport Encryption
Passbook
Encryption
Patient Record
No Security
Literature Survey
NEAR FIELD COMMUNICATION :
Near field communication (NFC) is a set of standards for smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into close proximity, usually no more than a few centimeters. Present and anticipated applications include contactless transactions, data exchange, and simplified setup of more complex communications such as Wi-Fi. Communication is also possible between an NFC device and an unpowered NFC chip, called a "tag". NFC standards cover communications protocols and data exchange formats, and are based on existing radio-frequency identification (RFID) standards including ISO/IEC 14443 and FeliCa. The standards include ISO/IEC 18092 and those defined by the NFC Forum, which was founded in 2004 by Nokia, Philips and Sony, and now has more than 160 members. The Forum also promotes NFC and certifies device compliance.
REFERENCES
[1]D. R. Hankerson, S. A. Vanstone, A. J. Menezes, Guide to Elliptic Curve Cryptography, 2003. [2] W. Rankl, W. Effing, Smart card handbook, 3rd ed., John Wiley and Sons Ltd., Baffins Lane, England: Spring Verlag. [3] W. Rankl, W. Effing, Smart Card Applications, Design Models for using and programming smart cards, 2007. Giesecke & GmbH.Devrient, Munich. x Germany, Translated by Kenneth Cox. [4] J. A .Menezes, C.Paul, V.Oorschot, S. A. Vanstone Handbook of Applied Cryptography, 5the ed., 2001. [5] T. Abdurahmonov, M. H. Helmi, Y. E. Thiam, The Implementation of Elliptic Curve Binary Finite Field for the Global Smart Card, Proceedings of 2010 IEEE Student Conference on Research and Development (SCOReD 2010), 13 - 14 Dec 2010, Putrajaya, Malaysia. 978-1-4244-8648-9/10/ 2010 IEEE, 2010, pp. 169-173. [6] T. Abdurahmonov, Y. E. Thiam, M. H. Helmi, Improving Smart Card Security Using Elliptic Curve Cryptography over Prime Field, 2010. [7] T. Abdurahmonov, M. H. Helmi, Y. E. Thiam, Personal Information Requirements of Global Information System, International Conference on Science and Social Research (CSSR 2010), Kuala Lumpur, Malaysia, 2010, pp. 1197-1202.