CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Communications of the ACM
UEPS - A Second Generation Electronic Wallet
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Liability and Computer Security: Nine Principles
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Current technological impediments to business-to-consumer electronic commerce
Communications of the AIS
Guest Editorial: Introduction to the Special Section
IEEE Transactions on Software Engineering
Key dimensions of business-to-consumer web sites
Information and Management
SOFSEM '98 Proceedings of the 25th Conference on Current Trends in Theory and Practice of Informatics: Theory and Practice of Informatics
The Correctness of Crypto Transaction Sets (Discussion)
Revised Papers from the 8th International Workshop on Security Protocols
Secret Key Authentication with Software-Only Verification
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Secure method invocation in Jason
CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Practical schemes for privacy and security enhanced RFID
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Hi-index | 0.00 |
One of the problems facing the builders of the 'Information Superhighway' is how to charge for services. The high costs of billing systems suggest that prepayment mechanisms could play a large part in the solution. Yet how does one go about making an electronic prepayment system (or indeed any kind of payment system) robust? We describe some recent systems engineering experience which may be relevant_the successful introduction of cryptology to protect prepayment electricity meters from token fraud. These meters are used by a number of utilities from Scotland to South Africa, and they present some interesting reliability challenges.