Academic
Publications
Tokenization and Other Methods of Security for Cardholder Data

Tokenization and Other Methods of Security for Cardholder Data,10.1080/19393555.2011.560923,Information Security Journal: A Global Perspective,Jeff St

Tokenization and Other Methods of Security for Cardholder Data  
BibTex | RIS | RefWorks Download
This paper compares the relative security strengths and practical use of tokenization with other cardholder data protection methods including truncation, masking, encryption, hash, and keyed hash. The usefulness of each method is described, and the subtle security weaknesses of combining methods are explored. Further, the inherent complexities of using cryptographic methods with sound key management practices are also presented.
Journal: Information Security Journal: A Global Perspective , vol. 20, no. 2, pp. 91-99, 2011
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.