The construction of CPU-card-based e-card system for campus
Abstract
References
Index Terms
- The construction of CPU-card-based e-card system for campus
Recommendations
Securing credit card transactions with one-time payment scheme
Traditional credit card payment is not secure against credit card frauds because an attacker can easily know a semi-secret credit card number that is repetitively used. Recently one-time transaction number has been proposed by some researchers and ...
A Security Framework for Card-Based Systems
FC '01: Proceedings of the 5th International Conference on Financial CryptographyThe legal framework provided by the Electronic Signature Act, enacted to law as of October 1, 2000, has fueled the interest for digital signature-based payment transactions over the Internet. The bulk of formalization and security analysis to date on ...
Payment card forensic analysis
While one would not even consider them alike, payment cards are one of the most valuable and widely used embedded systems. Payment card systems are probably the most attacked and counterfeited. In fact, even though the use of smart cards have introduced ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chairs:
- Honghua Tan,
- Jun Zhang,
- Program Chairs:
- Dehuai Yang,
- Yanwen Wu
Sponsors
- ACM Wuhan Chapter: ACM Wuhan Chapter
- Wuhan Univ.: Wuhan University, China
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- Anhui province
- Natural Science Foundation of Anhui Province
Conference
- ACM Wuhan Chapter
- Wuhan Univ.
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 55Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in