Risks of the passport single signon protocol
Proceedings of the 9th international World Wide Web conference on Computer networks : the international journal of computer and telecommunications netowrking
Practical network support for IP traceback
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Ciphers with Arbitrary Finite Domains
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Grammar based off line generation of disposable credit card numbers
Proceedings of the 2002 ACM symposium on Applied computing
A Security Framework for Card-Based Systems
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
A web transaction security scheme based on disposable credit card numbers
International Journal of Electronic Security and Digital Forensics
A pervasive identification service for physical access control
Proceedings of the 5th international conference on Pervasive services
A Light Number-Generation Scheme for Feasible and Secure Credit-Card-Payment Solutions
EC-Web '08 Proceedings of the 9th international conference on E-Commerce and Web Technologies
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
A pragmatic approach to temporary payment card numbers
International Journal of Electronic Security and Digital Forensics
An efficient k-anonymous localization technique for assistive environments
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Localization of credential information to address increasingly inevitable data breaches
Proceedings of the 2008 workshop on New security paradigms
Securing credit card transactions with one-time payment scheme
Electronic Commerce Research and Applications
Dynamic virtual credit card numbers
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Accountability in centralized payment environments
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
Implementing disposable credit card numbers by mobile phones
Electronic Commerce Research
Fuzzy virtual card agent for customizing divisible card payments
EC-Web'05 Proceedings of the 6th international conference on E-Commerce and Web Technologies
A limited-used key generation scheme for internet transactions
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Hi-index | 0.00 |
Recently, some credit card companies have introduced limited-use credit card numbers--for example, American Express's single-use card numbers and Visa's gift cards. Such limited-use credit cards limit the exposure of a traditional long-term credit card number, particularly in Internet transactions. These offerings employ an on-line solution, in that a credit card holder must interact with the credit card issuer in order to derive a limited-use token. In this paper, we describe a method for cryptographic off-line generation of limited-use credit card numbers. This has several advantages over the on-line schemes, and it has applications to calling cards as well. We show that there are several trade-offs between security and maintaining the current infrastructure.