ABSTRACT

Discussing about security, question always arises as to where to implement

the security mechanisms? Is a mobile handset that is capable of loading and

executing Java applets secure enough as a platform for financial transactions?

This depends on the security target of the application and the overall system

architecture, but the handset is not the best choice in many cases. To achieve

better security on a technical level, we can employ secure hardware such as

smart cards. This chapter explains the basics of smart card technology, and it

also shows how smart cards can help to establish end-to-end transaction

security in wireless environments. This chapter is targeted at readers

who have acquired a basic understanding of IT security, cryptography, and

wireless technology from the previous chapters.