نتایج جستجو برای: debit transaction
تعداد نتایج: 26193 فیلتر نتایج به سال:
Debit cards have become an indispensable part of the U.S. payments system, accounting for more than a third of consumer payments at point of sale. With this development has come controversy: Card networks charge merchants fees that merchants believe are too high. And most of the fees are ad valorem—that is, based on transaction value—rather than fixed fees per transaction. Merchants are critica...
This paper presents a novel method of using Dynamic Soft Descriptor as a fraud prevention method for Merchant (as opposed to card Issuer) in a credit/debit card transaction under Card Not Present (CNP) environment, such as online transactions. A unique identifier is embedded into the transaction descriptor, which will instantly appear in the cardholder’s credit/debit card online statement. By c...
چکیده ندارد.
The SB{PRAM is a shared memory parallel machine under construction in Saarbr ucken. With the help of simulations we have evaluated the performance of transaction systems on this machine. We use the well known DEBIT/CREDIT benchmark as workload. According to the simulations the machine reaches 6000 transactions per second with 256 data disks, 32 log disks and 128 processors, although each proces...
Banks want to use their genuine strong credential for online banking transaction authorization the debit card. Customers nowadays are usually equipped with a Smartphone and prefer to not carry a card reader in addition. Methods where developed that use the Smartphone to authorize online banking transactions. These methods are vulnerable to Smartphone malware. We present NFC-TAN as a Smartphone ...
-Now a day, e-commerce sites are very popular. Online shopping using wap enabled mobile phone has widely come into use. Debit and credit cards are used for secure etransaction. As the technology developed thief are also very smart, they stolen our detail from wap and use it. we present a model that can be used for secure transaction during using smart phone and give the features of smart phone ...
In this paper we shall introduce a new electronic payment concept based on the popular direct debit payment model, entitled periodical payments. The direct debit model currently in use online is neither secure nor flexible, and requires a leap of faith by the customer who must trust the merchant to behave honestly. Electronic direct debit request (DDR) forms are not signed by both parties in a ...
This thesis presents a framework of a passively replicated transaction manager. By integrating transactions and replication, two well known fault tolerance techniques, the framework provides high availability for transactional systems and better support for non-deterministic execution for replicated systems. A prototype Java implementation of the framework, based on Jgroup/ARM and Jini, has bee...
This document describes a new cryptographic protocol that allows the efficient authentication of an unlimited amount of data coming from an IC Card by an off-line terminal where the IC Card’s cryptographic capability is limited to computing one-way functions and MACs. The authentication of the IC Card and its data are based on a Challenge-Response protocol using one-way functions. The protocol ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید