providing security for e-wallet using e-cheque
نویسندگان
چکیده
payment is one of the main parts in businesses. different types of software, hardware and methods for paying electronically have been presented. different types of banking cards, e-wallet, internet web pages for payment make it possible to pay both online and offline. however, in most payment tools, exchanging money is anonymously and untraceably. therefore, although most security techniques within payment tools are considered to restrict abuse, if it is stolen, it makes possible to be abuse. furthermore, anonymous characteristics of e-money make it possible for money laundering. e-cheque includes both sides name in a business, and also it is traceable. by using e-cheque techniques in payment tools instead of e-money, it is possible to increase payment tools security.
منابع مشابه
Electronic Commerce and E-wallet
In electronic commerce, the challenges of payment transactions were initially underestimated. Business via the internet and mobile telephony has so far been dominated by the methods of payment systems in traditional business. However, in light of advances in e-commerce, traditional business models are increasingly coming up against their limits. To understand the concept of electronic commerce,...
متن کاملTrust in E-Cheque in Electronic Payments
Today, e-commerce has considerable portion in commercial businesses, and it has been developing. One of the most important steps in e-commerce is e-payment that has been done through different tools such as e-banking, and e-cheques. In this type of electronic transactions, there are always different worries both for payers and payees due to untruthfulness. For example, amount modifying, date mo...
متن کاملA Holistic Approach for Providing Security Solutions in e-Government
E-Government is now in a stage where effective and secure online transaction services have to be provided. Yet, initial security are primarily technical. Many technical concepts and tools have been developed in the scope of e-Commerce. Applying these to the scope of eGovernment need careful investigations. Security aspects do not, however, concern technical aspects only. The particular security...
متن کاملE-wallet Software Architecture with Decentralized Credentials
This paper reports on results from a Master thesis project undertaken to develop software architecture for decentralized credentials, a generalization of the concept of an electronic wallet system developed in the European research project CAFÉ [1]. Within this new model you can leave most of the content of your electronic wallet (credentials, keys and passwords) at the security of your residen...
متن کاملParasitic Authentication To Protect Your E-Wallet
T he electronic wallet (e-wallet) has received much attention lately. It promises to consolidate many of the personal items carried around by the modern individual: wallet, phone, pager, diary, and keys. In fact, Nokia's 9001 Communicator already combines the phone, pager, and diary into one unit. The question arises, however, of how to provide user authentication. Traditional protection mechan...
متن کاملM-Wallet Security using Cued Click Points
The main goal of this paper is to provide higher level of security by using graphical password authentication scheme. Text passwords are easily broken by various intruders and may hack all confidential information of user. User often create memorable passwords that are easy for attackers to guess, but strong system –assigned passwords are difficult for user to remember. So we are making use of ...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
international journal of information science and managementجلد ۲۰۱۳، شماره ۰۴، صفحات ۸۵-۹۶
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023