Triggering the Smart Card Readers Supply Chain

Abstract

In the last 12 years or so, many governments have launched modern identity management systems. These systems typically integrate a set of advanced and complex technologies to provide identification and authentication capabilities. The major output of such systems is smart identity cards that bind the cardholders identities to their biographical data and one or more biometric characteristics. The field of government practice has been focusing on the enrolment capabilities and infrastructure rollout, with little focus on smart card applications in the public domain. This article attempts to address this area in the body of knowledge from a government view point. It explores card reader adoption opportunities in both the public and private sectors, and attempts to outline the United Arab Emirates’ (UAEs) government’s plans to disseminate card readers and promote their adoption in government and various industrial groups in the country.

Share and Cite:

A. Al-Khouri, "Triggering the Smart Card Readers Supply Chain," Technology and Investment, Vol. 4 No. 2, 2013, pp. 69-75. doi: 10.4236/ti.2013.42008.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] S. Narendra, “Connecting Identity and Mobility: A Se cure, Scalable and Sustainable Mobile Wallet Approach,” IQT Quarterly, Vol. 4, No. 1, 2012, pp. 18-21. Http://tyfone.com/IQT_Quarterly_Summer2012_Tyfone_article.pdf
[2] U. Hansmann and M. S. Nicklous, “Smart Card Application Development Using Java,” Springer, Berlin, 2002.
[3] F. Morgner, D. Oepen, W. Müller and J. Redlich, “Mo bile Smart Card Reader Using NFC-Enabled Smart Phones,” 2012. http://sar.informatik.hu-berlin.de/research/publications/SAR-PR-2012-07/SAR-PR-2012-07_.pdf
[4] D. Paret, “RFID and Contactless Smart Card Applications,” Wiley, New York, 2005.
[5] K. Mayes and K. Markantonakis, “Smart Cards, Tokens, Security and Applications,” Springer, Heidelberg, 2010.
[6] M. Pelletier, M. Trepanier and C. Morency, “Smart Card Data in Public Transit Planning: A Review,” 2009. Https://www.cirrelt.ca/DocumentsTravail/CIRRELT-2009-46.pdf
[7] S. A. M. Rizvi, H. S. Rizvi and Z. Al-Baghdadi, “Smart Cards: The Future Gate,” Proceedings of the World Congress on Engineering and Computer Science 2010, WCECS 2010, 20-22 October 2010, San Francisco, pp. 81-86. http://www.iaeng.org/publication/WCECS2010/WCECS2010_pp81-86.pdf
[8] H. Taherdoost, S. Sahibuddin and N. Jalaliyoon, “Smart Card Security; Technology and Adoption,” International Journal of Security (IJS), Vol. 5, No. 2, 2011 pp. 74-84. http://cscjournals.org/csc/manuscript/Journals/IJS/volume5/Issue2/IJS-84.pdf
[9] K. Finkenzeller, “RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication,” Wiley, New York, 2010.
[10] W. Jansen, S. Gavrila, C. Séveillac and V. Korolev, “Smart Cards and Mobile Device Authentication: An Overview and Implementation,” National Institute of Standards and Technology, 2005. Http://csrc.nist.gov/publications/nistir/nist-IR-7206.pdf
[11] R. Ramasamy and A. P. Muniyandi, “An Efficient Pass word Authentication Scheme for Smart Card,” International Journal of Network Security, Vol. 14, No. 3, 2012, pp. 180-186. http://ijns.femto.com.tw/contents/ijns-v14-n3/ijns-2012-v14-n3-p180-186.pdf
[12] S. S. Baboo and K. Gokulraj, “A Secure Dynamic Authentication Scheme for Smart Card Based Networks,” International Journal of Computer Applications, Vol. 11, No. 8, 2010, pp. 5-12. http://www.ijcaonline.org/volume11/number8/pxc3872157.pdf
[13] B. Bakker, “Mutual Authentication with Smart Cards,” 1999. http://static.usenix.org/events/smartcard99/full_papers/bakker/bakker.pdf
[14] J. T. Monk and H. N. Dreifus, “Smart Cards: A Guide to Building and Managing Smart Card Applications,” John Wiley & Sons, New York, 1997.
[15] A. M. Al-Khouri, “Population Growth and Government Modernisation Efforts: The Case of GCC Countries,” International Journal of Research in Management and Technology, Vol. 2, No. 1, 2012, pp. 1-8.
[16] J. Briggs and R. Beresford, “Smart Cards in Health,” 2009. http://www.chmi.port.ac.uk/pubs/smartcards/smartcard_report.pdf
[17] S. Chellappan and V. Paruchuri, “Integrating Smart Cards with Vehicular Networks: Architecture and Applications,” 2009. http://web.mst.edu/~cswebdb/Workshop-AFRL/paper22009751.pdf
[18] O. S. Choudary, “The Smart Card Detective: a Hand-Held EMV Interceptor,” Master’s Dissertation, University of Cambridge, Cambridge, 2010. http://www.cl.cam.ac.uk/~osc22/docs/mphil_acs_osc22.pdf
[19] A. Catherine and W. J. Barr, “Smart Cards: Seizing Strategic Business Opportunities,” McGraw-Hill, Boston, 1996.
[20] M. Hendry, “Multi-Application Smart Cards: Technology and Applications,” Cambridge University Press, Cam bridge, 2007.
[21] Smart Card Alliance, “Smart Cards and Biometrics,” 2011. http://irisid.com/download/news/Smart_Cards_and_Biometrics_030111.pdf
[22] Frost and Sullivan, “World Smart Card Readers and Chipsets Market,” 2010. http://www.frost.com
[23] WRA, “Largest Biometric Database: Emirates Identity Authority Sets World Record,” World Record Academy, 2012. http://www.worldrecordacademy.com/technology/largest_biometric_database_Emirates_Identity
_Authority_sets_world_record_113117.html
[24] Al-Bayan, “Identity Card Shortens the Time of Data Entry in the Dubai Courts to 7 Seconds,” Al Bayan Newspaper, UAE (Arabic Version), Dubai, 2009. http://www.albayan.ae/across-the-uae/1235654452291-2009-03-02-1.410704
[25] A. M. Al-Khouri, “Identity and Mobility in a Digital World,” Investment & Technology, Vol. 4. No. 1, 2012, pp. 7-12.
[26] A. M. Al-Khouri, “eGovernment Strategies: The Case of the United Arab Emirates (UAE),” European Journal of ePractice, No. 17, 2012, pp. 126-150.
[27] A. M. Al-Khouri, “Emerging Markets and Digital Economy: Building Trust in the Virtual World,” International Journal of Innovation in the Digital Economy, Vol. 3, No. 2, 2012, pp. 57-69.
[28] L. A. Mohammed, A. Ramli, V. Prakash and M. B. Daud, “Smart Card Technology: Past, Present, and Future,” 2004. http://www.journal.au.edu/ijcim/2004/jan04/jicimvol12n1_article2.pdf

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.