15.08.2012 Views

CONTENTS - Emerald

CONTENTS - Emerald

CONTENTS - Emerald

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

041151 `Doing it the Pick 'nPayway'<br />

R Martin, Cards International (12/12/94) p11<br />

South Africa's largest retailer has set up its own debit card system in order to<br />

collect transaction fees previously paid to the banks. They are concerned that a new<br />

smartcard scheme may enable the banks to regain control.<br />

041152 `Concept of an electronic retail payment system with distributed<br />

control'<br />

T Matsumoto, JW-ISC 95 pp 24{33<br />

This article introduces an electronic retail payment system to provide exible and<br />

e cient funds transfers, while maintaining security, reliability and anonymity. Funds<br />

are located on cards, and can be transferred to other cards via intelligent terminals,<br />

which periodically sent audit information to the banks.<br />

041153 `On interactive human identi cation scheme'<br />

T Matsumoto, R Mizutani, JW-ISC 95 pp 1{4<br />

The authors report on a question-answer password identi cation scheme, and discuss<br />

its resistance against attack.<br />

041154 `Attack of the hackers'<br />

H McKenzie, Banking Technology (Mar 95) p 20<br />

PBX and other telephone toll fraud is growing rapidly, especially in the USA and<br />

is estimated to cost phone companies $500m a year. It is now dominated by organised<br />

crime, and insurance can be bought tocover it .<br />

041155 `Network if you can get it'<br />

M Meredith, Scottish Banker (Feb 95) pp 3{5<br />

This article provides a bankers' perspective of the opportunities and threats of the<br />

Internet. There is a shortage of commercial credibility, which banks can help to x.<br />

041156 `Multi-user quantum cryptography'<br />

Y Mu, YL Zheng, Y Lin, ISITA 94 pp 245{250<br />

The authors extend Bennett-Brassard's key distribution protocol to multi-user<br />

cryptography. Two basic con gurations of communication channel, the so-called fanshaped<br />

and series con gurations, are considered; it is shown that many other con gurations<br />

can be obtained from them, and that the systems are secure against intercept/resend<br />

attack.<br />

041157 `Countering the counterfeiters'<br />

J Newton, Cards International (21/12/94) p12<br />

Card fraud is endemic in China; counterfeiters felt safe from arrest until a joint<br />

China/Hong Kong initiative inMay 94. Since then, counterfeit card factories have been<br />

raided in Beijing and Shantou; these had been using legitimate VISA and Mastercard<br />

holograms which the manufacturers had apparently been duped into supplying. However,<br />

there are probably over 100 hologram makers in China with the skills to produce<br />

passable forgeries.<br />

041158 `Close to the nerve'<br />

M Norton, Banking Technology (Dec 94/Jan 95) pp 29{31<br />

Fraud cost VISA $655m worldwide last year, or 0.2% of turnover, at which rate it<br />

has been constant for some time. The organisation has run successful trials of neural<br />

network technology which tries to identify out-of-pattern transactions, and has also<br />

supplied 300 terminals to let US immigration o cers check the validity of cards found<br />

on suspects.<br />

041159 `Software glitch leads to crime by ATM gang'<br />

M Norton, Banking Technology (Mar 95) p 5<br />

Thieves in Oregon stole $364,770 by making 724 ATM withdrawals over 54 hours<br />

9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!