2001
DOI: 10.1147/sj.403.0635
|View full text |Cite
|
Sign up to set email alerts
|

Securing e-business applications using smart cards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2002
2002
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 1 publication
0
8
0
Order By: Relevance
“…As suggested by Hamann et al (2000), although the use of public key cryptography allows a more straightforward authentication scheme, smart cards without public key cryptography capability are widely accepted and gaining popularity:…”
Section: Perceptions Of Online Security and Authentication Issuesmentioning
confidence: 99%
“…As suggested by Hamann et al (2000), although the use of public key cryptography allows a more straightforward authentication scheme, smart cards without public key cryptography capability are widely accepted and gaining popularity:…”
Section: Perceptions Of Online Security and Authentication Issuesmentioning
confidence: 99%
“…Extant studies show that security is critical to electronic payment and transactions (Guo and Salvendy 2009;Hamann et al 2001;Hondo, Nagaratnam, and Nadalin 2002;Karkin 2002;Shelfer and Procaccino 2002). Security refers to the extent to which individuals believe that a system is secure for transmitting sensitive data during an electronic transaction process (Salisbury et al 2001).…”
Section: Securitymentioning
confidence: 99%
“…Another increasing important method involves the use of smart card-related technologies. According to Hamann et al (2001), recent years have seen many brands and associated types of smart cards coming into B2B and B2C markets. The basic major categories include: simple file-systemoriented smart cards without public key capability, advanced file-system smart cards with public key capability, Java Cards, Windows-powered smart cards, and multi-application operating system (MULTOS) cards.…”
Section: Application Of Smart Card-related Technologiesmentioning
confidence: 99%
“…Smart cards are storing credits such as pay telephone cards and photocopier cards used at some educational institutions, as well as for identification purposes and other applications in the transportation, retail and government markets. As indicated by Hamann et al (2001), the European Union and the US have passed legislation to establish the conditions for making a digital signature the legally binding identification and authentication mechanism for contracts on the Internet. This legislation requires that the technology employed not allow secret keys to be copied or used by non-authorized parties.…”
Section: Application Of Smart Card-related Technologiesmentioning
confidence: 99%