706 research outputs found

    A COMPARISON OF THE MOST POPULAR ELECTRONIC MICROPAYMENT SYSTEMS

    Get PDF
    The buying and selling of products or services over electronic systems such as the Internet and other computer networks is known as electronic commerce. In order to reduce the costs of electronic transactions, when one exchanges cheaper goods and services, specific payment protocols must be used. These protocols are actually the foundation for electronic micropayments, which implement simplified and cheaper schemes intended for small value transactions. In this paper we shall present and compare the main characteristics of the most popular micropayment systems used in both face-to-face and remote commerce.e-commerce, micropayment, security, encryption, Chipper, GeldKarte, Mondex, Proton, First Virtual, NetBill, KLELine, Odysseo, MicroMint

    Electronic payment systems

    Full text link

    Reliable OSPM schema for secure transaction using mobile agent in micropayment system

    Get PDF
    The paper introduces a novel offline payment system in mobile commerce using the case study of micro-payments. The present paper is an extension version of our prior study addressing on implication of secure micropayment system deploying process oriented structural design in mobile network. The previous system has broad utilization of SPKI and hash chaining to furnish reliable and secure offline transaction in mobile commerce. However, the current work has attempted to provide much more light weight secure offline payment system in micro-payments by designing a new schema termed as Offline Secure Payment in Mobile Commerce (OSPM). The empirical operation are carried out on three types of transaction process considering maximum scenario of real time offline cases. Therefore, the current idea introduces two new parameters i.e. mobile agent and mobile token that can ensure better security and comparatively less network overhead

    ELECTRONIC COMMERCE SECURITY IN THE CONTEXT OF THE MEANS OF PAYMENT DEMATERIALIZATION

    Get PDF
    Some items regarding electronic commerce, electronic vulnerabilities, electronic means of payment, digital money and electronic micropayments are presented below. Then is presented a method of assessing the quality of applications and e-commerce Web sites. This method is then adapted from the operational point of view, developed and implemented in the study of the electronic micropayment systems’ security, in the purpose of analyzing and evaluating their security in the context of the means of payment dematerialization.e-commerce, micropayment, security, encryption, digital economy, EWAM

    Secure Credits for Micro Payments Scheme using Encrypted Techniques

    Get PDF
    Online shopping payment scheme is one of the popular in recent years. During payment process the attackers aim to stealing the customer date by targeting the point of scale (PoS) system. Increasing malware that ca steal card data as soon they are read by the device details. This server is identified from legal to illegal control is provided to customer key approach. Once collect the details at customer side are customer account is disabling automatically by erasable PUFs. It includes that limited activity as server to client transaction is sure. Attackers often aim at staling such customer data by targeting the Point of scale (for sort, PoS) system. I.e. the point at which retailer first acquires customer data. Modern PoS system is powerful computer equipped with card reader and running specialized software. Increasingly often, user device are leveraged as input to the PoS. In these scenarios, malware that can steal card data as soon as they are read by the device has flourished .As such as, in case where customer and vendor are persistently or intermittently disconnected from the net work, no secure on-line payment is possible. This work describes SPEF, over up to date approaches I term of flexibility and security. To the best of our knowledge SPEF is the first solution that provide secure fully off line payment while being resilient to all currently known Pops breaches. In particular details SPEF architecture components and protocols .Further a thorough analysis of SPEF functional security properties is provider showing its effectiveness and visibility
    • …
    corecore