ABSTRACT
Discussing about security, question always arises as to where to implement
the security mechanisms? Is a mobile handset that is capable of loading and
executing Java applets secure enough as a platform for financial transactions?
This depends on the security target of the application and the overall system
architecture, but the handset is not the best choice in many cases. To achieve
better security on a technical level, we can employ secure hardware such as
smart cards. This chapter explains the basics of smart card technology, and it
also shows how smart cards can help to establish end-to-end transaction
security in wireless environments. This chapter is targeted at readers
who have acquired a basic understanding of IT security, cryptography, and
wireless technology from the previous chapters.