𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Smart Card Security and Applications

✍ Scribed by Mike Hendry


Publisher
Artech House Publishers
Year
2001
Tongue
English
Leaves
323
Series
Artech House Telecommunications Library
Edition
2nd
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This extensively updated, second edition offers the reader a current overview of the ways smart cards address the computer security issues of today's distributed applications. New discussions on multi-application operating systems, computer networks, and the Internet are included to keep the reader abreast of the very latest developments in this field. The book provides technical details on the newest protection mechanisms, features a discussion on the effects of recent attacks, and offers a clear methodology for solving unique security problems. From user authentication in remote payments, Internet transactions, and telephony, to fraud and counterfeit in card payments, to electronic ticketing, portability, and confidentiality, this comprehensive resource describes the major applications of smart cards. It explains how smart cards are particularly relevant to Internet-based applications, and to payment in the modern world through the use of cryptography, public key infrastructures, and biometrics.

✦ Table of Contents


Smart Card Security and Applications Second Edition......Page 1
Contents v......Page 5
Foreword xvii......Page 17
Part I Background 1......Page 19
The march of the card 3......Page 21
What is a chip card? 4......Page 22
Systems and procedures 5......Page 23
Market issues 6......Page 24
Organization of this book 7......Page 25
Reference 9......Page 27
Perceptions 11......Page 29
... and reality 12......Page 30
Calculating the risks: probabilities and odds 13......Page 31
Reference 15......Page 33
Security criteria 17......Page 35
Quantifying the threat 22......Page 40
Standards 27......Page 45
Documenting the specification 30......Page 48
Reference 31......Page 49
Part II Technology 33......Page 51
Visual features 35......Page 53
Magnetic stripe 37......Page 55
Enhancing security using complementary technologies 40......Page 58
Optical 41......Page 59
Smart cards 42......Page 60
Hybrids 45......Page 63
Others 46......Page 64
Cryptology overview and terminology 49......Page 67
Algorithms 50......Page 68
Keys 54......Page 72
Key management 62......Page 80
Public key infrastructures 65......Page 83
Computational requirements 66......Page 84
Summary 67......Page 85
References 68......Page 86
Personal identification types 71......Page 89
Requirements 73......Page 91
Components 75......Page 93
Behavioral 76......Page 94
Physiometric 78......Page 96
Biometrics and cards 82......Page 100
7 Chip Card Types and Characteristics 83......Page 101
Memory cards 84......Page 102
Microprocessor cards 85......Page 103
Contact and contactless 88......Page 106
Form factors 92......Page 110
Carrier 97......Page 115
External security features 98......Page 116
Chip 99......Page 117
Contacts 105......Page 123
Antenna 106......Page 124
Mask 108......Page 126
Attacks and countermeasures 109......Page 127
Reliability factors 112......Page 130
Sample card specifications 113......Page 131
References 116......Page 134
9 Multiapplication Operating Systems 117......Page 135
Objectives 118......Page 136
Functions 119......Page 137
Products 120......Page 138
References 124......Page 142
Reader 125......Page 143
Terminal 131......Page 149
Network 138......Page 156
Host systems 140......Page 158
References 142......Page 160
11 Processes and Procedures 143......Page 161
Chip design 144......Page 162
Manufacture 145......Page 163
Personalization 147......Page 165
Loading/validation 149......Page 167
Use 150......Page 168
Lost, stolen, and misused cards 151......Page 169
Application loading and unloading 153......Page 171
End of life 155......Page 173
Part III Applications 157......Page 175
Fixed telephones 159......Page 177
Mobile telephones 163......Page 181
Cable and satellite television 168......Page 186
References 172......Page 190
13 Computer Networks and E-commerce 173......Page 191
Network security 174......Page 192
Internet browsing and e-mail 176......Page 194
E-commerce 179......Page 197
References 184......Page 202
Bank cards 185......Page 203
Credit/debit cards 189......Page 207
Electronic purses 196......Page 214
On-line transactions 202......Page 220
Benefits payment 206......Page 224
New delivery channels 208......Page 226
References 209......Page 227
Insurance 211......Page 229
Medical records 212......Page 230
Patient monitoring 217......Page 235
References 218......Page 236
Local public transportation 219......Page 237
Taxis 223......Page 241
Air travel 224......Page 242
Road tolling 226......Page 244
Parking 228......Page 246
References 229......Page 247
Identity card requirements 231......Page 249
Issues 232......Page 250
Access control 233......Page 251
Government cards 235......Page 253
β€œWhite cards” 236......Page 254
Reference 237......Page 255
Functions and applications 239......Page 257
Downloading 241......Page 259
Card and application control 243......Page 261
Issuer responsibilities 244......Page 262
Consumer issues 245......Page 263
Interchange and compatibility with existing card systems 246......Page 264
Aims 247......Page 265
Criteria 249......Page 267
Model 250......Page 268
Analysis 253......Page 271
Market forecasts 259......Page 277
Cards 261......Page 279
Application downloading 263......Page 281
Card and terminal standards 264......Page 282
Chip cards and the mainstream 265......Page 283
Conclusions 266......Page 284
Appendix A: Standards 269......Page 287
Appendix B: Glossary 277......Page 295
Appendix C: Bibliography (Smart Card Security References) 287......Page 305
About the Author 291......Page 309
Index 293......Page 311


πŸ“œ SIMILAR VOLUMES


Smart Cards, Tokens, Security and Applic
✍ Keith Mayes, Konstantinos Markantonakis πŸ“‚ Library πŸ“… 2008 πŸ› Springer 🌐 English

<P><STRONG>Smart Cards, Tokens, Security and Applications provides a broad overview of the many card systems and solutions that are in practical use today. This state-of-the art work is written by contributing authors who are active researchers and acknowledged experts in their field. A single book

Smart Cards, Tokens, Security and Applic
✍ Keith Mayes, Konstantinos Markantonakis (eds.) πŸ“‚ Library πŸ“… 2017 πŸ› Springer International Publishing 🌐 English

<p>This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile system

Smart Card Security: Applications, Attac
✍ B. B. Gupta; Megha Quamara πŸ“‚ Library πŸ“… 2020 πŸ› CRC Press 🌐 English

<strong><em>Smart Card Security: Applications, Attacks, and Countermeasures</em></strong>provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It disc

Smart Card Security: Applications, Attac
✍ B.B. Gupta, Megha Quamara πŸ“‚ Library πŸ“… 2020 πŸ› CRC Press/Routledge/Taylor & Francis Group 🌐 English

Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks as

Smart Card Security-Applications, Attack
✍ B.B. Gupta (Author); Megha Quamara (Author) πŸ“‚ Library πŸ“… 2019 πŸ› CRC Press

<p><strong><em>Smart Card Security: Applications, Attacks, and Countermeasures</em></strong> provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It

Smart Card Technologies and Applications
✍ Jean-Jacques Quisquater, Pierre Paradinas, Yves Deswarte, Anas Abou El Kalam πŸ“‚ Library πŸ“… 2004 πŸ› Springer 🌐 English

<P>In the Information Society, the smart card, or smart device with its processing power and link to its owner, will be the potential human representation or delegate in Ambient Intelligence (Pervasive Computing), where every appliance or computer will be connected, and where control and trust of th