e-EMV: emulating EMV for internet payments with trusted computing technologies.
Shane BalfeKenneth G. PatersonPublished in: STC (2008)
Keyphrases
- computing technologies
- payment protocol
- credit card
- security mechanisms
- comprehensive analysis
- payment systems
- computing systems
- cloud computing
- security issues
- resource constrained
- formal analysis
- fraud detection
- access control
- digital data
- computer networks
- mobile computing
- smart card
- security requirements
- computing resources
- high performance computing
- operating system
- information systems
- academia and industry
- computer systems
- mobile devices
- big data
- mobile applications
- context aware
- sensitive information
- mobile commerce
- learning activities
- wireless communication