By Topic

Aspects of Computer Security, IEE Colloquium on

Date 9 Apr 1990

Filter Results

Displaying Results 1 - 6 of 6
  • Electronic purse

    Publication Year: 1990, Page(s):3/1 - 3/3
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (84 KB)

    The concept of the electronic purse on an integrated circuit (IC) card has been talked about for some years. In this time little progress has been made in actually implementing such an instrument even though everybody agrees that it is a wonderful idea and creates float. The author establishes what is meant by an electronic purse and quotes three descriptions produced by the International Associat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EDI security

    Publication Year: 1990, Page(s):1/1 - 1/3
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (156 KB)

    The use of EDI (electronic data interchange) and the single European market will each have a tremendous impact on the ways in which companies conduct their business. There is a need to look at the security requirements for EDI systems to be used within the EC. A Community programme TEDIS (trade EDI systems), was established to address this issue, among others. The author identifies some of the sec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic identification of people: improving the performance of dynamic signature verification

    Publication Year: 1990, Page(s):4/1 - 4/5
    Cited by:  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (248 KB)

    The problem of verifying the identity of people presenting to EDI or other electronic transactions terminals is becoming more important as the value manipulated by such systems and their use becomes more widespread. All techniques have their appropriate and overlapping application areas. However, the author concentrates on the use of writing-in particular the dynamics of the written signature. Dyn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing and compliance of secure products and systems

    Publication Year: 1990, Page(s):5/1 - 5/3
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (160 KB)

    Outlines the need for testing secure products and systems. Two schemes for evaluation are described, one in the US and the other in the UK. The need for more work in conformance testing of standards implementation is identified View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systems integration in EFTPOS systems

    Publication Year: 1990, Page(s):6/1 - 6/4
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (180 KB)

    The application of electronics to the mass payment industry-EFTPOS (electronic funds transfer at point of sale)-is a revolution that is well under way. A fragmented approach to security in EFTPOS systems is being undertaken, both within the UK and internationally. Examples of up front strategic planning are very few and have been swamped by the competitive pressures facing individual banks. Althou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEE Colloquium on `Aspects of Computer Security' (Digest No.060)

    Publication Year: 1990
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (12 KB)

    The following topics were dealt with: EDI security; personal identity verification using automatic face identification; electronic purses; dynamic signature verification; testing and compliance of secure systems; systems integration in EFTPOS systems; satellite data protection and subscription TV View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.