CarD
نویسندگان
چکیده
منابع مشابه
Manufacturing process Card order Card order + secret data + personal data Card order + personal data
متن کامل
Protecting against Credit Card Forgery with Existing Magnetic Card Readers
Existing magnetic cards adopt plain text to store confidential information, thus being vulnerable to an untrusted credit card reader or a skimming device. To tackle the problem, researchers have proposed many solutions such as integrated circuit card (IC card) and mobile wallets applications [6, 9, 12, 20, 21]; however, none of them can support existing magnetic card readers thereby facing sign...
متن کاملFuzzy Virtual Card Agent for Customizing Divisible Card Payments
E-commerce customers may have a problem when paying for the purchase of a major item, if its price is larger than the available credit on their credit card. In the brick and mortar world, this problem would be solved by paying part of the bill with cash or with a second credit card. In e-commerce, however, this has not been an option. Furthermore, even when a customer could pay the whole purcha...
متن کاملDeveloping Smart Card-Based Applications Using Java Card
In this paper we describe a methodology for developing smart card-based applications which accounts for both internal and external software production: on-card and client programs. This development methodology is based on the application of distributed object-oriented principles to Java Card. We design a model in which a card application is viewed as a remote object accessed through method invo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Transcription
سال: 2011
ISSN: 2154-1264,2154-1272
DOI: 10.4161/trns.2.1.13628