http://iet.metastore.ingenta.com
1887

Simplifying key management in electronic fund transfer point of sale systems

Simplifying key management in electronic fund transfer point of sale systems

For access to this article, please select a purchase option:

Buy article PDF
$19.95
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Electronics Letters — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In the letter we will consider some of the security problems that arise within a large electronic fund transfer point of sale (EFTPOS) system, paying particular attention to the difficulties of key management. In particular, we will introduce the concept of a transaction key which provides automatic key management at almost no extra cost.

References

    1. 1)
      • H.J. Beker . Security in an electronic fund transfer system. Inform. Privacy , 185 - 189
    2. 2)
      • F.L. Warner . (1977) , Microwave attenuation measurement.
    3. 3)
      • J.B. Benton . Economics and use of electronic fund transfer. Telecommunications , 35 - 41
    4. 4)
      • W.F. Ehrsom , S.M. Matyas , C.H. Meyer , W.L. Tuchman . A cryptographic key management scheme for implementing the Data Encryption Standard. IBM Sys. Journal , 106 - 125
    5. 5)
      • M.R. Houghton . An introduction to electronic fund transfer techniques. Commun. Int. , 32 - 33
    6. 6)
      • S.M. Matyas , C.H. Meyer . Generation, distribution and installation of cryptographic keys. IBM Sys. Journal , 126 - 137
    7. 7)
      • C.H. Meyer , S.M. Matyas . (1982) , Cryptography.
    8. 8)
      • R.M. Needham , M.D. Schroeder . Using encryption for authentication in large networks of computers. Commun. ACM , 993 - 999
http://iet.metastore.ingenta.com/content/journals/10.1049/el_19830303
Loading

Related content

content/journals/10.1049/el_19830303
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address