Varieties of smartcard fraud.
Susan BurnsGeorge R. S. WeirPublished in: Int. J. Electron. Secur. Digit. Forensics (2008)
Keyphrases
- smart card
- fraud detection
- fingerprint authentication
- security analysis
- anomaly detection
- information security
- security requirements
- java card
- secret key
- secure communication
- digital signature
- sensitive data
- security mechanisms
- authentication protocol
- tcp ip
- security enforcement
- communication networks
- outlier detection