Using EMV Cards to Protect E-commerce Transactions | SpringerLink
Skip to main content

Using EMV Cards to Protect E-commerce Transactions

  • Conference paper
  • First Online:
E-Commerce and Web Technologies (EC-Web 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2455))

Included in the following conference series:

Abstract

A growing number of payment transactions are now being made over the Internet. Although transactions are typically made over a secure channel provided using SSL or TLS, there remain some security risks. Meanwhile, EMV-compliant IC cards are being introduced to reduce fraud for conventional debit/credit transactions. In this paper, we propose a way of using EMV IC cards for secure remote payments, such as those made via the Internet, with the goal of providing protection against some of these residual risks. The scheme described in this paper is based on the EMV 2000 Integrated Circuit Card Specification for Payment Systems, which is first outlined. Threats to, and advantages and disadvantages of, the scheme are also examined.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. L. D. Stein. Web Security: A step-by-step reference guide. Addison Wesley, 1999.

    Google Scholar 

  2. R. Keller, G. Zavagli, J. Hartmann, F. Williams. Mobile Electronic Commerce: Research investigation into loading and paymnet functionality in wireless wallets. available at http://citeseer.nj.nec.com/cs, 1998.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Khu-Smith, V., Mitchell, C.J. (2002). Using EMV Cards to Protect E-commerce Transactions. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds) E-Commerce and Web Technologies. EC-Web 2002. Lecture Notes in Computer Science, vol 2455. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45705-4_40

Download citation

  • DOI: https://doi.org/10.1007/3-540-45705-4_40

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44137-3

  • Online ISBN: 978-3-540-45705-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics