565 research outputs found

    A COMPARISON OF THE MOST POPULAR ELECTRONIC MICROPAYMENT SYSTEMS

    Get PDF
    The buying and selling of products or services over electronic systems such as the Internet and other computer networks is known as electronic commerce. In order to reduce the costs of electronic transactions, when one exchanges cheaper goods and services, specific payment protocols must be used. These protocols are actually the foundation for electronic micropayments, which implement simplified and cheaper schemes intended for small value transactions. In this paper we shall present and compare the main characteristics of the most popular micropayment systems used in both face-to-face and remote commerce.e-commerce, micropayment, security, encryption, Chipper, GeldKarte, Mondex, Proton, First Virtual, NetBill, KLELine, Odysseo, MicroMint

    Electronic payment systems

    Full text link

    ELECTRONIC COMMERCE SECURITY IN THE CONTEXT OF THE MEANS OF PAYMENT DEMATERIALIZATION

    Get PDF
    Some items regarding electronic commerce, electronic vulnerabilities, electronic means of payment, digital money and electronic micropayments are presented below. Then is presented a method of assessing the quality of applications and e-commerce Web sites. This method is then adapted from the operational point of view, developed and implemented in the study of the electronic micropayment systems’ security, in the purpose of analyzing and evaluating their security in the context of the means of payment dematerialization.e-commerce, micropayment, security, encryption, digital economy, EWAM

    Reliable OSPM schema for secure transaction using mobile agent in micropayment system

    Get PDF
    The paper introduces a novel offline payment system in mobile commerce using the case study of micro-payments. The present paper is an extension version of our prior study addressing on implication of secure micropayment system deploying process oriented structural design in mobile network. The previous system has broad utilization of SPKI and hash chaining to furnish reliable and secure offline transaction in mobile commerce. However, the current work has attempted to provide much more light weight secure offline payment system in micro-payments by designing a new schema termed as Offline Secure Payment in Mobile Commerce (OSPM). The empirical operation are carried out on three types of transaction process considering maximum scenario of real time offline cases. Therefore, the current idea introduces two new parameters i.e. mobile agent and mobile token that can ensure better security and comparatively less network overhead

    Secure Credits for Micro Payments Scheme using Encrypted Techniques

    Get PDF
    Online shopping payment scheme is one of the popular in recent years. During payment process the attackers aim to stealing the customer date by targeting the point of scale (PoS) system. Increasing malware that ca steal card data as soon they are read by the device details. This server is identified from legal to illegal control is provided to customer key approach. Once collect the details at customer side are customer account is disabling automatically by erasable PUFs. It includes that limited activity as server to client transaction is sure. Attackers often aim at staling such customer data by targeting the Point of scale (for sort, PoS) system. I.e. the point at which retailer first acquires customer data. Modern PoS system is powerful computer equipped with card reader and running specialized software. Increasingly often, user device are leveraged as input to the PoS. In these scenarios, malware that can steal card data as soon as they are read by the device has flourished .As such as, in case where customer and vendor are persistently or intermittently disconnected from the net work, no secure on-line payment is possible. This work describes SPEF, over up to date approaches I term of flexibility and security. To the best of our knowledge SPEF is the first solution that provide secure fully off line payment while being resilient to all currently known Pops breaches. In particular details SPEF architecture components and protocols .Further a thorough analysis of SPEF functional security properties is provider showing its effectiveness and visibility

    User Perceptions of MicroPayment Methods in Electronic Commerce

    Get PDF
    This paper examines the users attitude towards existing micropayment systems, in Internet-based buying and selling transactions. A survey of existing and potential users was conducted. Findings suggest that customers do want the capability of micro-transactions. However the majority regards the overhead cost of microtransactions is the responsibility of the merchant. The customers are more concerned with the utility aspect of micropayment systems. Security and privacy are the most predominant concerns. Other concerns relate to convenience, flexibility and complexity. These concerns will need to be addressed before micropayment technologies will be accepted by the average online consumer

    The Architecture of Coupon-Based, Semi-off-Line, Anonymous Micropayment System for Internet of Things

    Get PDF
    Part 6: Computational Systems ApplicationsInternational audienceIn the Internet of Things a lot of business opportunities may be identified. The devices in IoT may create ad-hoc temporary networks to provide services or share some resources. Such services are characterized by a great economical potential, especially while provided at mass-scale and for incidental users. However, the development of paid services or resources in IoT is hampered by relatively big transaction costs of payment operations. To deal with this problem, we propose a novel architecture of coupon based, semi off line, anonymous micropayment system to enable transactions in the scope of Internet of Things. User anonymity and security is assured by the usage of standard cryptographic techniques together with novel architectural design of the payment processes. Utilization of a hash function allows generating and verifying electronic coins in computationally efficient way, so as to be executed even in hardware- and software-restricted environment such as Internet of Things
    • …
    corecore