E-traveler’s Checks with Reciprocal Authentication

نویسندگان

  • Ya-Fen Chang
  • Chin-Chen Chang
چکیده

As life becomes more and more convenient with all sorts of high-techs around, traveling has become more and more popular. Travelers nowadays can choose to use either common metallic/paper currency or credit cards to pay their bills. However, money in pockets or wallets/purses is subject to being robbed of, while credit cards are at the risk of being cloned. The traveler’s check, which is a third choice, comes in to get travelers around such risks and to protect their rights. However, traditional traveler’s checks cannot keep impostors from forging and cashing them illegally. This will result in serious damages to the check-issuing banks. In this paper, we shall propose a brand-new type of check called the e-traveler’s check to preserve the rights of the e-traveler’s check holders and prevent the check-issuing banks from being damaged.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

Three-Factor User Authentication Method Using Biometrics Challenge Response

We propose a three-factor authentication method by pointing out the weakness in the two-factor authentication method that uses telephony currently used in Internet banking by adding voice verification, creating a threeauthentication method (password, possession of phone, and voice printing) . The use of the two-factor authentication (two-path authentication) method using telephony has recently ...

متن کامل

Biometric person authentication with liveness detection based on audio-visual fusion

In this paper, we propose two new approaches for extracting mouth features for authenticating the person identity with liveness checks. The novel correlated audio-lip features and tensor lip-motion features allow liveness checks to be included in the person identity authentication systems, and ensures that the biometric cues are acquired from a live person who is actually present at the time of...

متن کامل

Some Properties of Generalized Self-reciprocal Polynomials over Finite Fields

Numerous results on self-reciprocal polynomials over finite fields have been studied. In this paper we generalize some of these to aself reciprocal polynomials defined in [4]. We consider the properties for the divisibility of a-reciprocal polynomials, estimate the number of all nontrivial a-self reciprocal irreducible monic polynomials and characterize the parity of the number of irreducible f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004