CONTENTS - Emerald
CONTENTS - Emerald
CONTENTS - Emerald
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
041151 `Doing it the Pick 'nPayway'<br />
R Martin, Cards International (12/12/94) p11<br />
South Africa's largest retailer has set up its own debit card system in order to<br />
collect transaction fees previously paid to the banks. They are concerned that a new<br />
smartcard scheme may enable the banks to regain control.<br />
041152 `Concept of an electronic retail payment system with distributed<br />
control'<br />
T Matsumoto, JW-ISC 95 pp 24{33<br />
This article introduces an electronic retail payment system to provide exible and<br />
e cient funds transfers, while maintaining security, reliability and anonymity. Funds<br />
are located on cards, and can be transferred to other cards via intelligent terminals,<br />
which periodically sent audit information to the banks.<br />
041153 `On interactive human identi cation scheme'<br />
T Matsumoto, R Mizutani, JW-ISC 95 pp 1{4<br />
The authors report on a question-answer password identi cation scheme, and discuss<br />
its resistance against attack.<br />
041154 `Attack of the hackers'<br />
H McKenzie, Banking Technology (Mar 95) p 20<br />
PBX and other telephone toll fraud is growing rapidly, especially in the USA and<br />
is estimated to cost phone companies $500m a year. It is now dominated by organised<br />
crime, and insurance can be bought tocover it .<br />
041155 `Network if you can get it'<br />
M Meredith, Scottish Banker (Feb 95) pp 3{5<br />
This article provides a bankers' perspective of the opportunities and threats of the<br />
Internet. There is a shortage of commercial credibility, which banks can help to x.<br />
041156 `Multi-user quantum cryptography'<br />
Y Mu, YL Zheng, Y Lin, ISITA 94 pp 245{250<br />
The authors extend Bennett-Brassard's key distribution protocol to multi-user<br />
cryptography. Two basic con gurations of communication channel, the so-called fanshaped<br />
and series con gurations, are considered; it is shown that many other con gurations<br />
can be obtained from them, and that the systems are secure against intercept/resend<br />
attack.<br />
041157 `Countering the counterfeiters'<br />
J Newton, Cards International (21/12/94) p12<br />
Card fraud is endemic in China; counterfeiters felt safe from arrest until a joint<br />
China/Hong Kong initiative inMay 94. Since then, counterfeit card factories have been<br />
raided in Beijing and Shantou; these had been using legitimate VISA and Mastercard<br />
holograms which the manufacturers had apparently been duped into supplying. However,<br />
there are probably over 100 hologram makers in China with the skills to produce<br />
passable forgeries.<br />
041158 `Close to the nerve'<br />
M Norton, Banking Technology (Dec 94/Jan 95) pp 29{31<br />
Fraud cost VISA $655m worldwide last year, or 0.2% of turnover, at which rate it<br />
has been constant for some time. The organisation has run successful trials of neural<br />
network technology which tries to identify out-of-pattern transactions, and has also<br />
supplied 300 terminals to let US immigration o cers check the validity of cards found<br />
on suspects.<br />
041159 `Software glitch leads to crime by ATM gang'<br />
M Norton, Banking Technology (Mar 95) p 5<br />
Thieves in Oregon stole $364,770 by making 724 ATM withdrawals over 54 hours<br />
9