메뉴 건너뛰기




Volumn , Issue , 2008, Pages 81-92

E-EMV: Emulating EMV for internet payments with trusted computing technologies

Author keywords

Card not present; EMV; Trusted computing

Indexed keywords

CARD NOT PRESENT; EMV; INTERNET BASED; INTERNET PAYMENTS; PAYMENT CARD; SYSTEM ARCHITECTURES; TRANSACTION PROCESSING; TRUSTED COMPUTING; TRUSTED COMPUTING TECHNOLOGY;

EID: 70349230089     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1456455.1456468     Document Type: Conference Paper
Times cited : (8)

References (45)
  • 1
    • 33845936084 scopus 로고    scopus 로고
    • A Logical Account of NGSCB
    • Proceedings of the 24th International Conference on Formal Techniques for Networked and Distributed Systems, of, Springer Verlag
    • M. Abadi and T. Wobber. A Logical Account of NGSCB. In Proceedings of the 24th International Conference on Formal Techniques for Networked and Distributed Systems, volume 3235 of LNCS, pages 1-12. Springer Verlag, 2004.
    • (2004) LNCS , vol.3235 , pp. 1-12
    • Abadi, M.1    Wobber, T.2
  • 4
    • 70349245980 scopus 로고    scopus 로고
    • AMD. AMD64 architecture programmer's manual: 2: System programming, AMD Publication no. 24594 rev. 3.11 edition, 2006.
    • AMD. AMD64 architecture programmer's manual: Volume 2: System programming, AMD Publication no. 24594 rev. 3.11 edition, 2006.
  • 6
    • 84869614431 scopus 로고    scopus 로고
    • APACS, April 2007
    • APACS. Card Fraud The Facts 2007. http://www.apacs.org.uk/, April 2007.
    • Card Fraud The Facts 2007
  • 8
    • 85013594843 scopus 로고    scopus 로고
    • Securing Peer-to-Peer networks using Trusted Computing
    • C.J. Mitchell, editor, IEE Press
    • S. Balfe, A.D. Lakhani, and K.G. Paterson. Securing Peer-to-Peer networks using Trusted Computing. In C.J. Mitchell, editor, Trusted Computing, pages 271-298. IEE Press, 2005.
    • (2005) Trusted Computing , pp. 271-298
    • Balfe, S.1    Lakhani, A.D.2    Paterson, K.G.3
  • 9
    • 68149178144 scopus 로고    scopus 로고
    • Augmenting Internet-based Card Not Present Transactions with Trusted Computing: An Analysis
    • Technical report, Technical report RHUL-MA-2006-9-v2, Department of Mathematics, Royal Holloway, University of London
    • S. Balfe and K.G. Paterson. Augmenting Internet-based Card Not Present Transactions with Trusted Computing: An Analysis. Technical report, Technical report RHUL-MA-2006-9-v2, (Department of Mathematics, Royal Holloway, University of London). http://www.rhul.ac.uk/mathematics/techreports.
    • Balfe, S.1    Paterson, K.G.2
  • 12
    • 84869635538 scopus 로고    scopus 로고
    • PCI Security Standards Council. Payment Card Industry Data Security Standard, Version 1.1, 2006
    • PCI Security Standards Council. Payment Card Industry Data Security Standard - Version 1.1. https://www.pcisecuritystandards.org/, 2006.
  • 15
    • 70349247369 scopus 로고    scopus 로고
    • EMVCo. EMV Specifications Version 4.1. http://www.emvco.com, June 2004.
    • EMVCo. EMV Specifications Version 4.1. http://www.emvco.com, June 2004.
  • 24
    • 70349241179 scopus 로고    scopus 로고
    • C. Jackson, D. Boneh, and J. Mitchell. Attack of the transaction generators. http: //crypto.stanford.edu/SpyBlock/spyblock.pdf.
    • C. Jackson, D. Boneh, and J. Mitchell. Attack of the transaction generators. http: //crypto.stanford.edu/SpyBlock/spyblock.pdf.
  • 27
    • 84869634558 scopus 로고    scopus 로고
    • January 2005
    • P. Meadowcroft. Combating card fraud. http://www.scmagazine.com/uk/news/ article/459478/combating+card+fraud/, January 2005.
    • Combating card fraud
    • Meadowcroft, P.1
  • 28
    • 35348989745 scopus 로고    scopus 로고
    • Trusted Computing
    • C.J. Mitchell, editor, The Institute of Electrical Engineers IEE, London, UK, April
    • C.J. Mitchell, editor. Trusted Computing. IEE Professional Applications of Computing Series 6. The Institute of Electrical Engineers (IEE), London, UK, April 2005.
    • (2005) IEE Professional Applications of Computing Series , vol.6
  • 31
    • 29244450159 scopus 로고    scopus 로고
    • Property-Based Attestation for Computing Platforms: Caring About Properties, Not Mechanisms
    • ACM Press
    • A-R. Sadeghi and C. Stüble. Property-Based Attestation for Computing Platforms: Caring About Properties, Not Mechanisms. In Proceedings of the 2004 Workshop on New Security Paradigms, pages 67-77. ACM Press, 2004.
    • (2004) Proceedings of the 2004 Workshop on New Security Paradigms , pp. 67-77
    • Sadeghi, A.-R.1    Stüble, C.2
  • 33
    • 84869608682 scopus 로고    scopus 로고
    • U.S. Securities and Exchange Commission
    • U.S. Securities and Exchange Commission. Form 10-K - The TJX Companies, INC. http://www.sec.gov/, 2007.
    • (2007) Form 10-K - The TJX Companies, INC
  • 35
    • 70349230443 scopus 로고    scopus 로고
    • SETCo. SET Secure Electronic Transaction 1.0 Specification - The Formal Protocol Definition, May 1997.
    • SETCo. SET Secure Electronic Transaction 1.0 Specification - The Formal Protocol Definition, May 1997.
  • 40
    • 70349253598 scopus 로고    scopus 로고
    • TCG. TCG Mobile Trusted Module Speciffication, 1.0 revision 1 edition, 2007.
    • TCG. TCG Mobile Trusted Module Speciffication, 1.0 revision 1 edition, 2007.
  • 42
    • 84869617646 scopus 로고    scopus 로고
    • at Petrol Stations. online.co.uk/, Febuary 18 2007
    • The Sunday Times. Don't Use Cards at Petrol Stations. http://business.timesonline.co.uk/, Febuary 18 2007.
    • The Sunday Times. Don't Use Cards


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.