Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
Chapter 3: Chip Migration
- Table 3.1: The Life Cycle of a Chip Card
- Table 3.2: Encoding with Fixed Format of Data Elements
- Table 3.3: BER-TLV Encoding of Data Elements
Chapter 4: EMV Compliant Data Organization
- Table 4.1: C-APDU of the SELECT Command
- Table 4.2: C-APDU of the READ RECORD Command
- Table 4.3: List of Supported Applications in the Terminal
- Table 4.4: Example of Applying Matching Criteria for a Given List of Card Applications Existing in the PSE
Chapter 5: EMV Certificates
- Table 5.1: Splitting of the Entity Public Key (Modulus)
- Table 5.2: Terminal Database of the CA Public Keys Accepted by the Acquirer
Chapter 6: Debit and Credit with EMV
- Table 6.1: C-APDU of the GET PROCESSING OPTIONS
- Table 6.2: AIP, Byte 1
- Table 6.3: The C-APDU Corresponding to INTERNAL AUTHENTICATE
- Table 6.4: The C-APDU Corresponding to GET DATA Command
- Table 6.5: C-APDU of the GET CHALLENGE Command
- Table 6.6: C-APDU of the VERIFY Command
- Table 6.7: Transaction Log as a Security Protection Against Split Sales
- Table 6.8: C-APDU of the GENERATE AC Command
- Table 6.9: C-APDU of the EXTERNAL AUTHENTICATE Command
Chapter 7: EMV Chip Migration Issues
- Table 7.1: Resource Needs for CAM Support
- Table 7.2: Resources Needed for the CVM Support
- Table 7.3: Guidelines for the CVM List Definition
Chapter 8: Remote Card Payments and EMV
- Table 8.1: Comparison of the Security Services Offered by TLS and SET
Appendix G: E-Commerce and M-Commerce Related Technologies
- Table G.1: Comparison between the Internet and the WAP Protocol Suites