Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,295 papers from all fields of science
Search
Sign In
Create Free Account
Derived unique key per transaction
Known as:
DUKPT
In cryptography, Derived Unique Key Per Transaction (DUKPT) is a key management scheme in which for every transaction, a unique key is used which is…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Cryptogram
Cryptography
Key (cryptography)
Key derivation function
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
IMPLEMENTACION DEL METODO DE ADMINISTRACION DE LLAVES DUKPT EN EL SIMULADOR ASSET PARA TRANSACCIONES FINANCIERAS EN DISPOSITIVOS PUNTO DE VENTA
E. Martínez
2017
Corpus ID: 166048282
Se hace enfasis en el proceso de como se garantiza la seguridad de la informacion mas importante de los usuarios de tarjetas de…
Expand
2015
2015
An Improved DUKPT Key Management System Based on SCM
Chen Zhangy
2015
Corpus ID: 114047743
The key management plays a core part in an encryption system. In order to ensure security and improve the efficiency of key…
Expand
2015
2015
Centralized Authorization Service (CAuthS) or Authorization as a Service (AuthaaS)—A Conceptual Architecture
Pranab Das
,
Abhinav Das
2015
Corpus ID: 268074770
Absence of architecture to describe how to implement authorization as a centralized service, in a way similar to authentication…
Expand
2014
2014
Applicability of DUKPT Key Management Scheme to Cloud Wallet and other Mobile Payments
A. Saha
,
S. Sanyal
arXiv.org
2014
Corpus ID: 12260853
After discussing the concept of DUKPT based symmetric encryption key management (e.g., for 3DES) and definition of cloud or…
Expand
2014
2014
DUKPT Key Management System Based on SCM
Chen Zhangy
2014
Corpus ID: 113149834
The encryption key is the core but the weakest link of encryption system. Therefore,the key management plays an important part in…
Expand
2012
2012
Smart authentication for real-time business process monitoring
Abdelrahman AlMahmoud
,
Maurizio Colombo
,
C. Yeun
,
H. Al-Muhairi
International Conference for Internet Technology…
2012
Corpus ID: 6726103
Tools that analyse critical business activities such as Business Process Monitoring (BPM) or Business Activity Monitoring (BAM…
Expand
2011
2011
The research and design of ATM PIN Pad based on triple DES
Wanping Wu
,
Jianxun Jin
,
Jun Cheng
IEEE International Conference on Information and…
2011
Corpus ID: 17015637
ATM(Automatic Teller Machine) PIN (personal identification number) pad is essential in bank. At present, DES (Data Encryption…
Expand
2008
2008
Technical and Commercial Potential for use of Wireless Trondheim's Wi-Fi Network for Payment Terminals
Joar Ulversøy
2008
Corpus ID: 167039804
Wireless Trondheim is a company offering city-wide Wi-Fi network in Trondheim, seeking new ways to utilize the Wi-Fi network to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required