Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
โ Scribed by Cristian Radu
- Year
- 2002
- Tongue
- English
- Leaves
- 463
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
As magnetic stripe cards are being replaced by chip cards that offer consumers and business greater protection against fraud, a new standard for this technology is being introduced by Europay, MasterCard and Visa (EMV). This volume presents a comprehensive overview of the EMV chip solution and explains how this technology provides a chip migration path, where interoperability plays a central role in the business model. The work offers an understanding of the security problems associated with magnetic stripe cards, and presents the business case for chip migration. Moreover, it explains the implementation of multi-application selection mechanisms in EMV chip cards and terminals, and shows you how to design a multi-application EMV chip card layout.
๐ SIMILAR VOLUMES
Radu, an electrical engineer who works as a consultant for payment systems and telecom operations in Belgium, has written a thorough description of EMV chip card technology. Following a description of chip migration with EMV and its use for debit and credit cards, Radu details the processing of such
This innovative resource provides the most comprehensive coverage of software fault tolerance techniques to guide professionals through design, operation and performance. It features an in-depth discussion on the advantages and disadvantages of specific techniques, so practitioners can decide which
A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks from the leading developer of the standards. It also examines important security
A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks from the leading developer of the standards. It also examines important security