ABSTRACT
With e-commerce accounting for a sharply increasing fraction of all business transactions conducted in the US, the need for reliable and secure online transactions using credit cards has never been greater. This paper explains the current techniques for assuring credit card security, describes recent trends, suggests how security methods could be improved, and reviews promising future technologies.
- About APACS. (n.d.). Retrieved April 21, 2007, from http://www.apacs.org.uk/about/index.htmlGoogle Scholar
- Anderson, N. (2007, March 23). FBI agents now stationed abroad to combat identify theft in the US. ARS Technica. Retrieved April 21, 2007, from http://arstechnica.com/news.ars/post/20070323-fbi-agents-nowstationed-abroad-to-combat-identity-theft-in-the-us.htmlGoogle Scholar
- Bednarz, A. (2005). Online businesses face credit card security deadline {Electronic version}. NetworkWorld. Retrieved April 9, 2007 from http://www.networkworld.com/news/2005/061305-pci.htmlGoogle Scholar
- Bray, H. (2006). Credit cards with radio tags speed purchases but track customers, too. Boston Globe. Retrieved April 22, 2007 from http://www.boston.com/business/globe/articles/2006/08/14/credit_cards_with_radio_tags_speed_purchases_but_track_customers_too/Google Scholar
- Card Security Code. (n.d.). Retrieved April 8, 2007, from http://en.wikipedia.org/wiki/Card_Security_CodeGoogle Scholar
- Cardholder information security program. (n.d.). Retrieved April 8, 2007, from http://www.usa.visa.com/merchants/risk_management/cisp_overview.html?it=c|/merchants/risk_management/cisp.html|CISP%20Basics&it=c|/merchants/risk_management/cisp.html|CISP%20BasicsGoogle Scholar
- Chip and PIN. (n.d.). Retrieved April 14, 2007, from http://www.accesskeyboards.co.uk/emv%20overview.htmGoogle Scholar
- Cohen, B. (2007, March 30). The world's biggest credit card fraud? Channel 4 News. Retrieved April 8, 2007, from http://www.channel4.com/news/articles/business_money/the+worlds+biggest+credit+card+fraud/365762Google Scholar
- Citibank first bank in the world to introduce biometric credit card. (2006). Retrieved April 21, 2007, from http://www.findbiometrics.com/article/311Google Scholar
- Credit card. (n.d.). Retrieved April 8, 2007, from http://en.wikipedia.org/wiki/Credit_card/Google Scholar
- Credit card fraud rises by 50%. (2001). Retrieved April 21, 2007, from http://news.bbc.co.uk/2/hi/business/1179590.stmGoogle Scholar
- Diners Club history overview and timeline. (n.d.). Retrieved April 8, 2007, from http://www.dinersclubnewsroom.com/anniversary.cfmGoogle Scholar
- Ecommerce tutorial introduction. (n.d.). Retrieved April 8, 2007, from http://www.online-commerce.com/tutorial.html G. M. (2007). Evolving credit. Popular Science, 270(2), 47. Retrieved April 8, 2007, from the Academic Search Premier database.Google Scholar
- Greenemeier, L., & Hoover, J. N. (2007). The hacker economy. InformationWeek, 1125, 32. Retrieved April 8, 2007, from the ProQuest Computing database.Google Scholar
- Herzberg, A. (2003). Payments and banking with mobile personal devices. Communications of the ACM, 46(5), 53--58. Retrieved April 8, 2007, from the ACM Digital Library database. Google ScholarDigital Library
- Heydt-Benjamin, T., Bailey, D., Fu, K., Juels, A., O'Hare, T. (2006). Vulnerabilities in First-Generation RFID-enabled Credit Cards. NYTimes.com. Retrieved April 22, 2007 from http://www.nytimes.com/packages/pdf/business/20061023_CARD/fc2007-submission.pdf Google ScholarDigital Library
- Hill, J. (2007, March 14). Fraudulent use of UK cards abroad soars. IOL Technology. Retrieved April 21, 2007, from http://www.ioltechnology.co.za/article_page.php?iSectionId=2885&iArticleId=3730796Google Scholar
- Keeping up with credit card fraud (n.d.) Retrieved April 22, 2007 from, http://www.morebusiness.com/running_your_business/management/d912805442.brcGoogle Scholar
- Kerber, R. (2007, March 1). Firms prodded to try smarter credit cards. Boston Globe. Retrieved April 8, 2007, from http://www.boston.comGoogle Scholar
- Kharif, O. (2005). May I see your voice, please? {Electronic version}. BusinessWeek Online. Retrieved April 9, 2007 from http://www.biometricgroup.com/in_the_news/04_20_05.htmlGoogle Scholar
- König, H. (1991). Cryptographic identification methods for smart cards in the process of standardization {Electronic version}. IEEE Communications Magazine, 29(6), 42--48.Google ScholarDigital Library
- Leyden, J. (2005, January 12). US jails Brit credit card fraud mastermind for 14 years. The Register. Retrieved April 21, 2007, from http://www.theregister.co.uk/2005/01/12/grand_theft_id/Google Scholar
- Leyden, J. (2007, March 14). Internet scams dominate UK card fraud losses. The Register. Retrieved April 21, 2007, from http://www.theregister.co.uk/2007/03/14/uk_card_fraud_trends/Google Scholar
- Mone, G., & Svoboda, E. (2007). The future of personal security {Electronic version}. Popular Science. Retrieved April 8, 2007 from http://www.popsci.com/popsci/technology/5863e31a4d630110vgnvcm1000004eecbccdrcrd/3.htmlGoogle Scholar
- Murthy, P. S. (2005). Which is the world's first credit card? India Abroad. Retrieved April 8, 2007, from http://ia.rediff.com/index.htmlGoogle Scholar
- News release summary: LawFuel. (2006). Retrieved April 21, 2007, from http://www.lawfuel.com/show-release.asp?ID=5888Google Scholar
- NCX Group (2006). Security Compliance -- Payment Card Industry (PCI) Data Security Standard. Retrieved April 9, 2007 from the 'PCI Data Security Standard' link on http://www.ncxgroup.com/pci.htmGoogle Scholar
- PCI data security standards. (n.d.). Retrieved April 21, 2007, from http://www.xtalks.com/pcidata.ashxGoogle Scholar
- Pitt, S., Lambert, M. (2007). Aligning PCI Data Security Standards with Pre-Existing Privacy and Security Mandates. Parasoft.com. Retrieved April 9, 2007 from http://www.xtalks.com/pcidata.ashxGoogle Scholar
- Plowright, M. (2006, July 24). The top 10 card fraud hotspots. MSN Money. Retrieved April 21, 2007, from http://money.uk.msn.com/Specials/Holiday_Money/article.aspx?cp-documentid=677360&wa=wsignin1.0Google Scholar
- Preventing credit card fraud: Learn how to protect yourself. (n.d.). Retrieved April 8, 2007, from http://www.consumeraction.org/archives/English/library/credit_cards/2000_PreventingCreditFraud/index.php?English/library/credit_cards/2000_PreventingCreditFraud/index.phpGoogle Scholar
- Quittner, J. (2004, August 2). Avoiding credit card fraud. ABC News. Retrieved April 8, 2007, from http://abcnews.go.com/Business/FinancialSecurity/story?id=89746&page=1&Business=trueGoogle Scholar
- Securing your future with two-factor authentication. (n.d.). Retrieved April 8, 2007, from http://www.rsa.com/node.aspx?id=1156Google Scholar
- Smithers, R., & Johnson, B. (2007). Inquiry launched after biggest ever credit card heist {Electronic version}. The Guardian.Google Scholar
- Tygar, J. D. (1998). Atomicity in electronic commerce. NetWorker, 2(2), 32--43. Retrieved April 8, 2007, from the ACM Digital Library database. Google ScholarDigital Library
- United States Secret Service. (n.d.). Investigative mission. Retrieved April 21, 2007, from http://www.secretservice.gov/investigations.shtmlGoogle Scholar
- Vijayan, J. (2007). GratisCard offers a credit card for the anonymous {Electronic version}. ComputerWorld.Google Scholar
- Wolfe, D. (2007). Visa security idea: Mag stripe with 'dynamic' code. American Banker, 172(48), 1--7. Retrieved April 8, 2007, from the Academic Search Premier database.Google Scholar
Index Terms
- Credit card transaction security
Recommendations
The credit card visual authentication scheme based on GF(28) field
Recently, with the popular use of the credit cards, credit card fraud has become a severe problem. Merchants suffer great losses from credit card fraud. In this paper, we focus on "chip and signature" card, propose a credit card visual authentication ...
A systematic security analysis of EMV protocol
AbstractEMV is the leading and widely used international standard for payment with smart cards. The EMV specification defines a highly configurable toolkit for payment protocols, which allows different combinations of card authentication, ...
Highlights- Europay, MasterCard, and Visa developed a smart card standard called EMV.
- EMV ...
Securing credit card transactions with one-time payment scheme
Traditional credit card payment is not secure against credit card frauds because an attacker can easily know a semi-secret credit card number that is repetitively used. Recently one-time transaction number has been proposed by some researchers and ...
Comments