Flylib.com
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
ISBN: 1580533051
EAN: 2147483647
Year: 2003
Pages: 131
Authors:
Cristian Radu
BUY ON AMAZON
Table of Contents
BackCover
Implementing Electronic Card Payment Systems
Chapter 1: Introduction
Part I: Magnetic stripe debit and credit cards
Part II: Chip migration with EMV(TM)
Part III: Remote debit and credit with EMV(TM)
Part I: Magnetic Stripe Debit and Credit Cards
Chapter 2: Payment Card Processing
2.2 Roles involved in payment card processing
2.3 Payment card brands
2.4 Credit and debit payment cards
2.5 Focusing on the magnetic stripe card
2.6 Threats and security protections
2.7 Processing at the point of service
2.8 Payment network and interchange messages
2.9 On-line authorization
2.10 Clearing and settlement
References
Part II: Chip Migration with EMV(TM)
Chapter 3: Chip Migration
3.1 A business case for chip migration
3.2 An overview of the chip card technology
3.3 Proprietary payment application
3.4 Interoperable payment application
References
Chapter 4: EMV(TM) Compliant Data Organization
4.1 Organization of the EMV(TM) specifications
4.2 EMV(TM) data elements
4.3 EMV(TM) file system
4.4 EMV(TM) application selection
References
Chapter 5: EMV(TM) Certificates
5.1 Certification mechanism and algorithm
5.2 Public key certificate for RSA scheme
5.3 Entities and certifiers
5.4 Entity public key remainder
5.5 EMV(TM) certification chains
5.6 Issuing EMV(TM) public key certificates
5.7 Verifying EMV(TM) public key certificates
5.8 Issuing signed static application data
5.9 Verifying the Signed Static Application Data
References
Chapter 6: Debit and Credit with EMV(TM)
6.2 Initiate application processing
6.3 Read application data
6.4 Off-line data authentication
6.5 Processing restrictions
6.6 Cardholder verification
6.7 Terminal risk management
6.8 Terminal action analysis
6.9 On-line processing and issuer authentication
6.10 Issuer scripts
References
Chapter 7: EMV(TM) Chip Migration Issues
7.1 EMV(TM) regulatory framework
7.2 Deriving ICC specifications by issuers
7.3 Selection criteria of the ICC architecture
7.4 Multiapplication ICC
7.5 Issuer s business case
7.6 Adaptive initiate application processing
7.7 Design criteria for CAM selection
7.8 Design criteria for CVM
7.9 Processing restrictions
7.10 Card risk management
References
Part III: Remote Debit and Credit with EMV(TM)
Chapter 8: Remote Card Payments and EMV(TM)
8.1 A model for remote card payments
8.2 Security aspects of remote card payments
8.3 Remote payment method based on TLS
8.4 SET-based solutions
8.5 TLS versus SET or wallet servers and EMV(TM) cards
8.6 Transaction processing for chip e-commerce
References
Appendix A: Security Framework
Reference
Appendix B: Generic Security Threats
Appendix C: Security Services
C.2 Realization of security services
References
Appendix D: Security Mechanisms
D.2 Cryptographic hash functions
D.3 Digital signature schemes
D.4 Public key certificates
D.5 Cardholder verification mechanisms
D.6 SDA mechanisms
D.7 DDA mechanisms
References
Appendix E: Block Ciphers
E.2 Modes of operation
E.3 DES, Triple-DES, and AES
E.4 MAC using a 64 bit-length block cipher
E.5 Key derivation
References
Appendix F: RSA Encryption and Signature Scheme
F.2 Public and secret RSA operations
F.3 Digital signature giving message recovery
F.4 Digital signature and encryption with PKCS1
References
Appendix G: E-Commerce and M-Commerce Related Technologies
G.2 SIM, STK, SMS, and WAP
G.3 Access devices for remote card payments
G.4 WAP protocol suite compared to Internet
References
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P-Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W-Z
List of Figures
List of Tables
List of Examples
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
ISBN: 1580533051
EAN: 2147483647
Year: 2003
Pages: 131
Authors:
Cristian Radu
BUY ON AMAZON
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Summary
Performance
Defining the Input and Output Functions in C
Client 4An Interactive Query Processor
PL/JavaWriting Stored Procedures in Java
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
Snort
NFR Security
Laws, Standards, and Organizations
Security Business Issues
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
3-D Layers from Photoshop Layers
Cause and Effect
Rotoscoping Techniques with Photoshop
Motion Matte Painting in Photoshop
Motion Titling Effects
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Office Object Models
Populating a Document with Data on the Server
Advanced Topic: Deploying Network Solutions to Be Cached Locally
Introduction to XML Schema Creation in Visual Studio
Writing a COM Add-In Using Visual Studio
Extending and Embedding PHP
The PHP Life Cycle
Setting Up a Build Environment
Accessing Streams
Configuration and Linking
Capturing Output
Comparing, Designing, and Deploying VPNs
Supporting IPv6 Traffic Transport in MPLS Layer 3 VPNs Using 6VPE
Designing and Deploying IPsec Remote Access and Teleworker VPNs
Summary: Comparing VPLS and IPLS
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies