نتایج جستجو برای: e payment

تعداد نتایج: 1039768  

2007
Wei Fan Huaying Shu Qiang Yan Xin Liu

Fairness is an important property of secure electronic commerce. Most of E-payment protocols guarantee fairness by using a Trusted Third Party (TTP) or semi-trusted third party. There are few protocols without a trusted third party. Based on concurrent signature, we propose two protocols suitable for digital products transaction, one for mobile payment and the other for the transaction which ha...

2002
Süleyman Kondakci

AbstractWith the increasing deployment of Web-enabled technologies, electronic fund transactions and home banking is rapidly taking place over the Internet. There is a growing need for a solid and robust electronic business and payment system. The current payment system bears several types of difficulties for Internet users. Financial institutions, banks, customers and merchants, around the cou...

Journal: :Electronic Commerce Research 2010
Olufunke R. Vincent Olusegun Folorunso Ayodele Akinde

The use of e-commerce has been associated with a lot of skepticism and apprehension due to some crimes associated with e-commerce and specifically to payment systems. The secure socket layer (SSL) protocol is trusted in this regard to secure transactions for sensitive applications like e-commerce. Unfortunately, the use of SSL protocol causes slow response time on the server which is a major ca...

2017

The growth of e-commerce platform is increasing rapidly and possesses a higher level of hazard compared to standard applications as well as it requires a more prominent level of safety.Additionally, the transaction and their data about clients are enormously sensitive, security production and privacy is exceptionally crucial. Consequently, the confirmation is generally vital towards security ne...

Journal: :Electronic Markets 2001
Simpson Poon Patrick Y. K. Chau

b s t r a c t Although debit/cash cards based on smart card technology promised to bring forth the end of loose change, very few managed to gain critical mass or come close to totally eliminating coins including those supported by major credit card operators (e.g., Visa Cash and Mondex). In this paper, we discuss a specific system – Octopus – which not only gained momentum among the passenger t...

2017
David Tolpin

We present a probabilistic model of an intrusion in a marked renewal process. Given a process and a sequence of events, an intrusion is a subsequence of events that is not produced by the process. Applications of the model are, for example, online payment fraud with the fraudster taking over a user’s account and performing payments on the user’s behalf, or unexpected equipment failures due to u...

2016
Yongrok Choi Lili Sun

An anonymous transaction environment and the advantage of virtual property have resulted in trust playing an important role in the rapid growth of online shopping in China. To satisfy this trust issue, Alibaba (China) Co., Ltd. (Hangzhou, China) invented Alipay, the largest third-party online payment service. Using a structural equation model (SEM), this paper attempts to determine whether Alip...

2006
Chaoqin Lei Weidong Kou Kai Fan Wei Fan

Abstract With the development of e-commerce, choosing a proper electronic payment method has become more and more important. Competing with other payment methods on the Internet, electronic cash has much more attractive properties, such as anonymity and off-line payment, and is generally considered as an ideal electronic payment method. However, the traceability of the customer or the cash in c...

2003
Alea M. Fairchild

“Driven by a desire to get paid more quickly, companies are moving more of their invoices and payment to the internet. Businesses care more about faster cash flow than they do about cutting costs.” (GartnerGroup, 2001). Electronic Invoice Presentment and Payment (EIPP) is targeted to the needs of corporates and can be integrated with e-marketplaces and B2B financial settlement for bank-neutral ...

2017
Gianluigi Folino Francesco Sergio Pisani

In modern payment systems, the user is often the weakest link in the security chain. To identify the key vulnerabilities associated with the user behavior and to implement a number of measures useful to protect the payment systems against these kinds of vulnerability is a real hard task. To this aim, we designed an architecture useful to divide the users of a payment system into pre-defined cla...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید