- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Ginni has Published 1580 Articles
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
1K+ Views
Dynamic Password is also known as One Time Password. It is used to solve the traditional problems which occur when the static Password authentication cannot cope with eavesdropping and replaying, making, guessing, etc.Using dynamic password, uncertainties will be treated in authentication information during the procedure of lodging to make authentication ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
517 Views
Smart Card Authentication is a means of checking users into enterprise resources including workstations and applications using a physical card in tandem with a smart card reader and application on the workstation. Smart card authentication is hugely secure but it has a poor user experience and is expensive to deploy ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
319 Views
There are several applications of smart card which are as follows −A smart card is a device generally the size and shape of a credit card and includes one or more integrated chips that implements the functions of a computer with a microprocessor, memory, and input/output. Smart cards can be ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
648 Views
A smart card is a card that stores data on a microprocessor or memory chip instead of the magnetic stripe found on ATM and credit cards. A smart card is a secure microcontroller that is generally used for generating, saving and working on cryptographic keys.Smart card authentication supports users with ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
257 Views
Biometrics is the recognition of a person by the measurement of their biological characteristics. For instance, users identifying to a computer or constructing by their fingerprint or voice is treated a biometrics identification.Biometric devices measure biological elements (like human features) to perform functions, including logging health/fitness data and authenticating users. ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
539 Views
There are four types of attacks on biometrics devices which are as follows −Processing and Transmission Level Attacks − Several biometric systems transmit sample information to local or remote offices for processing, it is also necessary that this transmission be protect, test the transmission be intercepted, read, or altered.Most biometric ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
175 Views
Biometrics is the recognition of a person by the measurement of their biological characteristics. For instance, users identifying themselves to a computer or constructing by their fingerprint or voice is treated a biometrics identification.Biometric devices measure biological elements (like human features) to implement functions, including logging health/fitness information and authenticating ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
659 Views
There are several types of security attacks on RFID Systems which are as follows −Physical Attack − The vulnerabilities in the implementation of larger level or transmission protocols, which are represented in the manufacturing process of RFID can be used in physical-layer attacks. One of the significant attacks which is ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
273 Views
In RFID, it is a technology that incorporates the need of electromagnetic or electrostatic coupling in the radio frequency (RF) portion of the electromagnetic spectrum to uniquely recognize an object, animal or person.The slow cost adoption of the RFID technology in the mass industry even after the presence of a ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
100 Views
The advantage of RFID which are as follows −RFID in the transportation sector − RFID tags can be employed in car services for storing recognition numbers of vehicles along with other data which can then be used for implementing automatic inventories using static RFID readers appropriately placed at various locations ... Read More