Smart card security and applications (2. ed.)
暂无分享,去创建一个
The book provides technical details on the newest protection mechanisms, features a discussion on the effects of recent attacks and presents a methodology for solving unique security problems with smart cards. From user authentication in remote payments, Internet transactions, and telephony to fraud and counterfeit in card payments to electronic ticketing, portability, and confidentiality, this resource describes the major applications of smart cards. It explains how smart cards are particularly relevant to Internet-based applications, and to payment in the modern world through the use of cryptography, public key infrastructures, and biometrics. Contents: Part 1: Background - Introduction. Problem Definition. Specifying the Requirements. Part 2: Technology Card Technology. Encryption. Passwords and Biometrics. Chip Card Types and Characteristics. Chip Card Security Features. Multiapplication Operating Systems. System Components. Processes and Procedures. Part 3: Applications Telephony and Broadcasting Applications. Computer Networks and E-commerce. Financial. Applications. Health. Transport. Personal Identification. Commercial Structures for Multiapplication Cards. Designing for Security. Looking Forward