Skip to main content

Assessment of threats for smart card based electronic cash

  • Conference paper
  • First Online:
Financial Cryptography (FC 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1465))

Included in the following conference series:

Abstract

The security of smart card based electronic cash have been receiving significant attention recently. However, there has been little systematic analysis or quantification of the impact of the security break on the smart card based electronic cash economy. This paper discusses the assessment of threats in two phases using two different methodologies. The first is the assessment of overall threat using the business system analysis model called “value chain” — the methodology to evaluate the activities necessary to achieve the final objectives of the counterfeiting organization. It is a qualitative method. The second is the quantification of such a threat using micro dynamic simulation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ezawa, K.J. and Schuermann, T., “Fraud/Uncollectible Debt Detection Using a Bayesian Network Based Learning System: A Rare Binary Outcome with Mixed Data Structures,” Proeedings of the 11th Conference Uncertainty in Artificial Intelligence, Morgan Kaufmann, pp. 157–166 (1995).

    Google Scholar 

  2. Ezawa, K.J., Singh, M., and Norton, S.W., “Learning Goal Oriented Bayesian Networks for Telecommunications Risk Management”, Proceedings of the 13th International Conference on Machine Learning, Morgan Kaufmann (1996).

    Google Scholar 

  3. Ezawa, K.J., and Norton, S., “Constructing Bayesian Networks to Predict Uncollectible Telecommunications Accounts,” IEEE EXPERT, Vol. 11, No. 5, pp. 45–51 (1996).

    Article  Google Scholar 

  4. Maher, D.P., “Fault Induction Attacks, Tamper Resistance, and Hostile Reverse Engineering in Perspective,” Financial Cryptography '97 — First International Conference, Springer Verlag (1997).

    Google Scholar 

  5. Porter, M.E., “Competitive Advantage,” Free Press (1985).

    Google Scholar 

  6. Harding, A.(editor), “Microsimulation and Public Policy”, North-Holland (1996).

    Google Scholar 

  7. Napiorkowski, G. and Borghard, W., “Modeling of Customer Response to Marketing of Local Telephone Services” in Dynamic Competitive Analysis in Marketing, Springer Verlag (1996).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Rafael Hirchfeld

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ezawa, K.J., Napiorkowski, G. (1998). Assessment of threats for smart card based electronic cash. In: Hirchfeld, R. (eds) Financial Cryptography. FC 1998. Lecture Notes in Computer Science, vol 1465. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0055473

Download citation

  • DOI: https://doi.org/10.1007/BFb0055473

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64951-9

  • Online ISBN: 978-3-540-53918-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics