Academic literature on the topic 'HOST CARD EMULATION'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'HOST CARD EMULATION.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "HOST CARD EMULATION"

1

Ozdenizci, Busra, Kerem Ok, and Vedat Coskun. "A Tokenization-Based Communication Architecture for HCE-Enabled NFC Services." Mobile Information Systems 2016 (2016): 1–20. http://dx.doi.org/10.1155/2016/5046284.

Full text
Abstract:
Following the announcement of Host Card Emulation (HCE) technology, card emulation mode based Near Field Communication (NFC) services have gained further appreciation as an enabler of the Cloud-based Secure Element (SE) concept. A comprehensive and complete architecture with a centralized and feasible business model for diverse HCE-based NFC services will be highly appreciated, particularly by Service Providers and users. To satisfy the need in this new emerging research area, a Tokenization-based communication architecture for HCE-based NFC services is presented in this paper. Our architecture proposes Two-Phased Tokenization to enable the identity management of both user and Service Provider. NFC Smartphone users can store, manage, and make use of their sensitive data on the Cloud for NFC services; Service Providers can also provide diverse card emulation NFC services easily through the proposed architecture. In this paper, we initially present the Two-Phased Tokenization model and then validate the proposed architecture by providing a case study on access control. We further evaluate the usability aspect in terms of an authentication scheme. We then discuss the ecosystem and business model comprised of the proposed architecture and emphasize the contributions to ecosystem actors. Finally, suggestions are provided for data protection in transit and at rest.
APA, Harvard, Vancouver, ISO, and other styles
2

JosephNg, Poh Soon, Pin Sen BrandonChan, and Koo Yuen Phan. "Implementation of Smart NFC Door Access System for Hotel Room." Applied System Innovation 6, no. 4 (July 24, 2023): 67. http://dx.doi.org/10.3390/asi6040067.

Full text
Abstract:
Security remains a top priority for those users in the hotel, even with the advent of innovative technological advances. This is because many tragic incidents, such as theft and crime, have occurred with unrestricted access. This paper proposes an intelligent door access system that would allow hotel guests to authenticate into their rooms without resorting to traditional closeness access methods. Therefore, research was conducted to solidify the understanding and refine the capabilities of the proposed system. This project aims to promote high-security aspects access system technology, which is Near-Field Communication with the use of application that have the function of simulated smart keys for explicit validation access. A Host-Card Emulator opens the opportunities for efficient financial benefit and the launch of a protective mechanism in the post-pandemic period. The suggested method was statistically and analytically accessed on hotel guests and staff from various hotels in Malaysia. The proposed system is a contactless NFC access control system that employs smartphone Host Card Emulation application technology to reduce the need for appropriate physical access, enhance security, and publicize the use of mobile access systems in the hospitality industry.
APA, Harvard, Vancouver, ISO, and other styles
3

Мартынов and V. Martynov. "Innovative Environment and Development Prospect of NFC and In-App Payments in New Technological Way." Economics 4, no. 6 (December 9, 2016): 79–84. http://dx.doi.org/10.12737/22932.

Full text
Abstract:
The article considers an open innovative environment in which there is NFC and In-App Payments, their development prospects, the pros and cons of these systems, their place in the sixth technological way, gives concepts of NFC, In-App Payments, considers the technology of contactless payments, the principle of operation of the device with a Secure Element NFC and Host Card Emulation technology, sanctifies the issue of the security of NFC devices, methods of protection against attacks on the device, the use of NFC in other electronic media. Comparative characteristics depending on the situation, NFC and In-App Payments are given. The article shows the global Informatization of our society in the sixth technological way.
APA, Harvard, Vancouver, ISO, and other styles
4

Gruntz, Dominik, Christof Arnosti, and Marco Hauri. "MOONACS: a mobile on-/offline NFC-based physical access control system." International Journal of Pervasive Computing and Communications 12, no. 1 (April 4, 2016): 2–22. http://dx.doi.org/10.1108/ijpcc-01-2016-0012.

Full text
Abstract:
Purpose The purpose of this paper is to present a smartphone-based physical access control system in which the access points are not directly connected to a central authorization server, but rather use the connectivity of the mobile phone to authorize a user access request online by a central access server. The access points ask the mobile phone whether a particular user has access or not. The mobile phone then relays such a request to the access server or presents an offline ticket. One of the basic requirements of our solution is the independence from third parties like mobile network operators, trusted service managers and handset manufacturers. Design/methodology/approach The authentication of the smartphone is based on public key cryptography. This requires that the private key is stored in a secure element or in a trusted execution environment to prevent identity theft. However, due to the intended independence from third parties, subscriber identity module (SIM)-based secure elements and embedded secure elements (i.e. separate hardware chips on the handset) were not an option and only one of the remaining secure element architectures could be used: host card emulation (HCE) or a microSD-based secure element. Findings This paper describes the implementation of such a physical access control system and discusses its security properties. In particular, it is shown that the HCE approach cannot solve the relay attack under conservative security assumptions and an implementation based on a microSD secure element is presented and discussed. Moreover, the paper also describes an offline solution which can be used if the smartphone is not connected to the access server. In this case, an access token is sent to the access point in response to an access request. These tokens are renewed regularly and automatically whenever the smartphone is connected. Originality/value In this paper, a physical access control system is presented which operates as fast as existing card-based solutions. By using a microSD-based secure element (SE), the authors were able to prevent the software relay attack. This solution is not restricted to microSD-based SEs, it could also be implemented with SIM-based or embedded secure elements (with the consequence that the solution depends on third parties).
APA, Harvard, Vancouver, ISO, and other styles
5

JosephNg, P. S. "Hotel room access control: an NFC approach ecotourism framework." Journal of Science and Technology Policy Management, August 17, 2023. http://dx.doi.org/10.1108/jstpm-10-2021-0153.

Full text
Abstract:
Purpose This study aims to highlight that security and flexibilities remain the main points of contention in the cordiality business. This research points to planning a framework that empowers hotel users to get to the room using a mobile access key. Advancing secured facilities, mobile phone “Near Field Communication” (NFC) innovation as the entrance device by carrying out an application containing an imitated mobile key for explicit verification access is used. Design/methodology/approach The proposed system is evaluated by triangulation of experimental, numerical and rational evaluation using partial least square structural equation modeling (PLS-SEM) with Malaysian hotel guests and employees. Findings The discoveries with the hypothesis supported validated that the suggested solution can eliminate physical cards, boost protection and encourage a contactless ecosystem. Theoretical, management and societal contributions are discussed here. Research limitations/implications This experiment comes with the constraints that it was conducted in only two hotels and does not fully reflect the choices of a wider range of travellers. Secondly, the cost of existing NFC smart locks is still relatively high, and along with the development of technology, the price will decrease when supply exceeds demand. Practical implications To promote high-security attributes, NFC technology as the access system by implementing an application containing an emulated smart key for specific authentication access is used. The host-card emulation enables cost-effectiveness profit and initiating a defence system in the pandemic era. Social implications To promote high-security attributes, NFC technology is used as the access system by implementing an application containing an emulated smart key for specific authentication access. The host-card emulation enables cost-effectiveness profit and initiating a defence system in the pandemic era. Originality/value The novelty of this study comes from the use of commonly available smartphone NFC features that are yet to be applied in the tourism ecosystem. The research provokes the applied concept of mobile smartkeys.
APA, Harvard, Vancouver, ISO, and other styles
6

Reijnders, Tom D. Y., Hessel Peters-Sengers, Lonneke A. van Vught, Fabrice Uhel, Marc J. M. Bonten, Olaf L. Cremer, Marcus J. Schultz, et al. "Effect of erythromycin on mortality and the host response in critically ill patients with sepsis: a target trial emulation." Critical Care 26, no. 1 (May 24, 2022). http://dx.doi.org/10.1186/s13054-022-04016-x.

Full text
Abstract:
Abstract Background Immunomodulatory therapies that improve the outcome of sepsis are not available. We sought to determine whether treatment of critically ill patients with sepsis with low-dose erythromycin—a macrolide antibiotic with broad immunomodulatory effects—decreased mortality and ameliorated underlying disease pathophysiology. Methods We conducted a target trial emulation, comparing patients with sepsis admitted to two intensive care units (ICU) in the Netherlands for at least 72 h, who were either exposed or not exposed during this period to treatment with low-dose erythromycin (up to 600 mg per day, administered as a prokinetic agent) but no other macrolides. We used two common propensity score methods (matching and inverse probability of treatment weighting) to deal with confounding by indication and subsequently used Cox regression models to estimate the treatment effect on the primary outcome of mortality rate up to day 90. Secondary clinical outcomes included change in SOFA, duration of mechanical ventilation and the incidence of ICU-acquired infections. We used linear mixed models to assess differences in 15 host response biomarkers reflective of key pathophysiological processes from admission to day 4. Results In total, 235 patients started low-dose erythromycin treatment, 470 patients served as controls. Treatment started at a median of 38 [IQR 25–52] hours after ICU admission for a median of 5 [IQR 3–8] total doses in the first course. Matching and weighting resulted in populations well balanced for proposed confounders. We found no differences between patients treated with low-dose erythromycin and control subjects in mortality rate up to day 90: matching HR 0.89 (95% CI 0.64–1.24), weighting HR 0.95 (95% CI 0.66–1.36). There were no differences in secondary clinical outcomes. The change in host response biomarker levels from admission to day 4 was similar between erythromycin-treated and control subjects. Conclusion In this target trial emulation in critically ill patients with sepsis, we could not demonstrate an effect of treatment with low-dose erythromycin on mortality, secondary clinical outcomes or host response biomarkers.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "HOST CARD EMULATION"

1

Fusek, Zdeněk. "Autentizace pomocí mobilních telefonů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220418.

Full text
Abstract:
This thesis deals with authentication by mobile phone. The mobile phone with operating system Android was chosen as authentication device. The Eclipse development environment was used for the implementation of applications. The aim of the thesis was to study and practically implement access system for mobile phones, where the Bluetooth LE and NFC interface are used for data transmission between the mobile device and reader. Firstly, the thesis deals with the client application, which is installed on the authenticated device, and then is focused on the characteristics of the application which is running on the reader. Both client and reader applications describe the design of graphical user interface, process of authentication via Bluetooth LE and NFC, analyse packages and classes, and eventually perform security analysis. The thesis also presents schema of authentication protocol HM14.
APA, Harvard, Vancouver, ISO, and other styles
2

Orgoň, Marek. "Pokročilé bezpečnostní aplikace pro Android." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220626.

Full text
Abstract:
The thesis deals with security of the Android operating system, both general security features and options for storing sensitive data. The suitability of Android KeyStore for storing sensitive data and the possibility of using the secure element for safe application calculations and smart card emulation are discussed. Using Host-based Card Emulation for contactless smart card emulation is discussed. The performance analysis of modular arithmetic operations for numbers with high bit length is examined. Following these analysis, an implementation of application for software contactless smart card emulation of HM12 and HM14 cryptographic protocol is proposed. And an implementation of application for verifying smart cards with these protocols is proposed. Also scheme for secure storage of sensitive data is proposed.
APA, Harvard, Vancouver, ISO, and other styles
3

TEWARI, AMIT MANI. "BLUETOOTH AUTOMATION USING HOST CARD EMULATION." Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/14703.

Full text
Abstract:
A health management system will be efficient if medical records of patient maintained smartly so that it can be accessed faster, easily available and portable. As with technology advancement there are revolutionary changes in area of handheld devices and wireless communication, this advancement in technology can be utilized to develop efficient and smart health care system. Smart cards can be used to store health data securely and it can be embedded in handheld device i.e. mobile phone, so that it is easily portable. Wireless technology i.e. Bluetooth, NFC can be used transfer health records between devices; this will avoid dependency on permanent and fixed storage and avoid traditional cumbersome paper reports. Major Goal of this thesis is to use wireless communication to HEALTHCARD to make it more efficient.  Bluetooth automation has been used for communicating health card devices i.e. patient handled device (mobile) with smart card device to transfer patient Health records.  Bluetooth communication has been automated to involve minimal user interaction i.e. No PIN exchange or confirmation, No Authentication or Authorization popup is shown still able to SEND and GET data over Bluetooth.  Secure Health Card has been used to Maintain Patient Health record on handheld devices.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "HOST CARD EMULATION"

1

Umar, Assad, and Keith Mayes. "Trusted Execution Environment and Host Card Emulation." In Smart Cards, Tokens, Security and Applications, 497–519. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50500-8_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "HOST CARD EMULATION"

1

Armando, Alessandro, Alessio Merlo, and Luca Verderame. "Trusted host-based card emulation." In 2015 International Conference on High Performance Computing & Simulation (HPCS). IEEE, 2015. http://dx.doi.org/10.1109/hpcsim.2015.7237043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kološ, Jan, and Martin Kotyrba. "User authentication based on the NFC host-card-emulation technology." In PROCEEDINGS OF THE INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING 2017 (ICCMSE-2017). Author(s), 2017. http://dx.doi.org/10.1063/1.5012347.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alattar, Mouhannad, and Mohammed Achemlal. "Host-Based Card Emulation: Development, Security, and Ecosystem Impact Analysis." In 2014 IEEE International Conference on High Performance Computing and Communications (HPCC), 2014 IEEE 6th International Symposium on Cyberspace Safety and Security (CSS) and 2014 IEEE 11th International Conference on Embedded Software and Systems (ICESS). IEEE, 2014. http://dx.doi.org/10.1109/hpcc.2014.85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Merlo, Alessio, Luca Lorrai, and Luca Verderame. "Efficient trusted host-based card emulation on TEE-enabled Android devices." In 2016 International Conference on High Performance Computing & Simulation (HPCS). IEEE, 2016. http://dx.doi.org/10.1109/hpcsim.2016.7568370.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pasquet, Marc, and Sylvie Gerbaix. "Fraud on host card emulation architecture: Is it possible to fraud a payment transaction realized by a mobile phone using an "Host Card Emulation" system of security ? Invited paper." In 2016 Second International Conference on Mobile and Secure Services (MobiSecServ). IEEE, 2016. http://dx.doi.org/10.1109/mobisecserv.2016.7440230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Umar, Assad, Keith Mayes, and Konstantinos Markantonakis. "Performance variation in host-based card emulation compared to a hardware security element." In 2015 First Conference on Mobile and Secure Services (MOBISECSERV). IEEE, 2015. http://dx.doi.org/10.1109/mobisecserv.2015.7072872.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Basyari, Rochman Saefulloh, Surya Michrandi Nasution, and Burhanuddin Dirgantara. "Implementation of host card emulation mode over Android smartphone as alternative ISO 14443A for Arduino NFC shield." In 2015 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC). IEEE, 2015. http://dx.doi.org/10.1109/iccerec.2015.7337036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Durfee, William, Saeed Hashemi, and Andrew Ries. "Hydraulic Ankle Foot Orthosis Emulator for Children With Cerebral Palsy." In BATH/ASME 2020 Symposium on Fluid Power and Motion Control. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/fpmc2020-2791.

Full text
Abstract:
Abstract Objective: Ankle foot orthoses (AFOs) are used by nearly 50% of children with cerebral palsy (CP) to ameliorate gait impairments. The methods used to prescribe and tune the mechanical properties of an AFO, including its angular stiffness about the ankle, are based on the intuition and experience of the practitioner. The long-term goal of this research is to develop and deploy a technology-based solution to prescribing passive AFOs that uses an AFO emulator to be used in the clinic that can, under computer control, vary its stiffness in real-time to determine the best stiffness for walking. The objective of this project was to design and bench-test a first-generation wearable hydraulic ankle exoskeleton, and to conduct a small clinical trial to determine whether walking in a conventional plastic AFO was the same as walking in the hydraulic exoskeleton whose stiffness was programmed to match that of the conventional AFO. Methods: The hydraulic ankle exoskeleton was comprised of a wearable ankle exoskeleton tethered by small-diameter hydraulic hose to a push-behind cart that contained the hydraulic power supply and control components. The ankle component contained a novel double-ended cylinder with a cable anchored to the piston. The system was controlled to emulate a rotary spring. Bench top tests were performed to validate the performance of the system. In addition, an early feasibility clinical trial was conducted with five children with cerebral palsy who walked in three conventional AFOs (flexible, medium and stiff) and the hydraulic AFO controlled to match each stiffness. Kinematics and dynamics of gait were measured with a 12-camera motion capture system and a force plate. Results: The weight of the wearable exoskeleton plus shoe was 1.5 kg, 60% over the design goal. The system, running at a rail pressure of 141 bar (2,050 psi), could produce 62 Nm of torque and could emulate springs from 1 to 4.6 Nm/deg, the stiffness range of most conventional AFOs. Once calibrated, the torque-displacement properties were similar to the matched conventional AFO. Walking metrics were the same for hydraulic and conventional AFOs. Interpretation: Small-scale hydraulics are effective for a wearable exoskeleton that is designed to mimic a passive AFO and hydraulics can be used to emulate a rotary stiffness. While heavier than the design target, the added weight of the hydraulic system did not seem to impact walking in a significant way. The metrics used to evaluate walking were not sensitive enough to detect any subtle differences between walking with the hydraulic system and walking in a normal AFO.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography