Using Digital Signatures as Evidence of Authorizationsin Electronic Credit - Card

نویسنده

  • Els Van Herreweghen
چکیده

Credit-card payment protocols such as iKP and SET use digital signatures to authenticate messages and authorize transactions. It is assumed that these digital signatures make the parties' authorizations non-repudiable, i.e., provable to a third-party veriier. In this paper, we deene a set of statements which participants in a payment may want to prove. We then investigate which of these statements can be proved with the digital signatures within iKP and SET, and make some general comments about requirements for provability in payment protocols.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparative Study and Simulation of Digital Forensic Tools

The cyber crimes such as online banking fraud, credit card theft, child pornography, intellectual property theft, identity theft, unauthorized intrusion, money laundering, digital piracy etc. are growing rapidly with technology. Desktops, smartphones, laptops, digital cameras, GPS devices and even watches all can be used to aid a fraud. All this devices leave behind a digital footprint. Gatheri...

متن کامل

Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

متن کامل

Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

متن کامل

Integrating Qualified Electronic Signatures with Password Legacy Systems

www.deaeslr.org DIGITAL EVIDENCE AND ELECTRONIC SIGNATURE LAW REVIEW Despite a common legal framework for electronic signatures within the European Union, qualified electronic signatures have not been a market success, although several governments are issuing or plan to issue signature capable identity cards to all their citizens. However, the high market penetration of smart cards does not nec...

متن کامل

New Signature Derivation using Existing Signatures

In banks, as part of normal procedure, receipts for deposits, statements of the bank account or credit card account are regularly issued to customers. This whole procedure is time consuming. Also, officials often find it difficult to sign for all the documents required by a customer though the related sub-processes are completed and corresponding documents are digitally signed. We consider the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999