EE4215_t5 - 9 What are the advancement of smart card...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
EE4215 Tutorial 5 1. How magnetic information are stored? What is the maximum capacity? 2. What are the common card fraud activities? 3. What are the common card fraud protection technologies? How these technologies can be counterfeited. 4. What is the concept of protection on appearance, access and data? Give one example for each type. 5. What are the features memory, CPU and Crypto-processor smart cards? Give one example for each type. 6. What is contact type and contactless type smart cards? Give one example for each. 7. Why the contactless type cannot be as powerful as contact type cards? What are the basic limitations? 8. Give examples of how smart card are used in Hong Kong.
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 9. What are the advancement of smart card technologies? 10. State ISO7816/1, /2,/3,./4. 11. What is ADPU? Describe its structures. 12. What are command and response ADPUs? 13. Is smart card really security? 14. How to make smart card more secure and reliable. 15. What is FIPS140-2? 16. What is Common Criterior? 17. What is Yellow Book? 18. How the security of smart card is evaluated? 19. What makes the life time of a contactless smart card be longer than that of contact type smart card? 20. State the mechanism of MD4. What is the weaknesses of MD4? How MD5 overcomes MD4 weaknesses? 21. What is SSL? What is SET? What are the major differences?...
View Full Document

This note was uploaded on 01/11/2012 for the course EE EE4215 taught by Professor Drcheng during the Winter '11 term at City University of Hong Kong.

Ask a homework question - tutors are online