Good-Enough Security: Toward a Pragmatic Business-Driven Discipline
IEEE Internet Computing
SecureClick: A Web Payment System with Disposable Credit Card Numbers
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Off-Line Generation of Limited-Use Credit Card Numbers
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
A web transaction security scheme based on disposable credit card numbers
International Journal of Electronic Security and Digital Forensics
Electronic Commerce Research and Applications
A Light Number-Generation Scheme for Feasible and Secure Credit-Card-Payment Solutions
EC-Web '08 Proceedings of the 9th international conference on E-Commerce and Web Technologies
A pragmatic approach to temporary payment card numbers
International Journal of Electronic Security and Digital Forensics
An efficient k-anonymous localization technique for assistive environments
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Localization of credential information to address increasingly inevitable data breaches
Proceedings of the 2008 workshop on New security paradigms
Implementing disposable credit card numbers by mobile phones
Electronic Commerce Research
International Journal of Human-Computer Studies
Hi-index | 0.00 |
Traditional credit card payment is not secure against credit card frauds because an attacker can easily know a semi-secret credit card number that is repetitively used. Recently one-time transaction number has been proposed by some researchers and credit card companies to enhance the security in credit card payment. Following this idea, we present a practical security enhancement scheme for one-time credit card payment. In our scheme, a hash function is used in generation of one-time credit card numbers with a secret only known to the card holder and issuer. Compared with related work, our scheme places less burden on credit card issuers, and can be easily deployed in on-line or off-line payment scenarios. Analysis and simulation show that the time and space complexity is affordable to the card issuer with desired security features.