Results (577)
Search Parameters:
Keyword: ApplicationStrong Authentication Protocol based on Java Crypto Chip as a Secure Element
Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509…
Read MoreRobust µController Implementations for a Linear Pneumatic Actuator Interaction
Over the years, pneumatic systems have recorded a remarkable performance in automated applications, based on their cost to efficiency ratio and ease of energy transmission. Therefore, their drawback of not being totally controllable devices in terms of position accuracy, still represents a challenge task for engineers. In this paper, a traditional three term controller (PID)…
Read More
