Sciweavers

45 search results - page 3 / 9
» An Anonymous Credit Card System
Sort
View
ESOP
2008
Springer
13 years 8 months ago
Just Forget It - The Semantics and Enforcement of Information Erasure
Abstract. There are many settings in which sensitive information is made available to a system or organisation for a specific purpose, on the understanding that it will be erased o...
Sebastian Hunt, David Sands
ICMB
2006
IEEE
102views Business» more  ICMB 2006»
14 years 12 days ago
Card-based Macropayment for Mobile Phones
Most new entrants into the mobile commerce marketplace are faced with a paradox; how can we attract users without merchants, and how can we attract merchants without customers? Wi...
Philip Garner, Reuben Edwards, Paul Coulton
ICMB
2005
IEEE
73views Business» more  ICMB 2005»
13 years 12 months ago
MMPS: A Versatile Mobile-to-Mobile Payment System
The paper presents an effective mobile-to-mobile payment system. A mobile phone with or without SIM card is enabled as an EMV payment instrument and is linked to a debit or credit...
Ashutosh Saxena, Manik Lal Das, Anurag Gupta
SP
2010
IEEE
226views Security Privacy» more  SP 2010»
13 years 10 months ago
Chip and PIN is Broken
—EMV is the dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. Known to bank customers as “Chip and PIN”, it is used in Eur...
Steven J. Murdoch, Saar Drimer, Ross J. Anderson, ...
CIKM
2008
Springer
13 years 8 months ago
Exploiting context to detect sensitive information in call center conversations
Protecting sensitive information while preserving the shareability and usability of data is becoming increasingly important. In call-centers a lot of customer related sensitive in...
Tanveer A. Faruquie, Sumit Negi, Anup Chalamalla, ...