Rozprawy doktorskie na temat „Secure Payments”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 46 najlepszych rozpraw doktorskich naukowych na temat „Secure Payments”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Al-Meaither, Mansour. "New schemes for secure electronic payments". Thesis, Royal Holloway, University of London, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.419912.
Pełny tekst źródłaChen, Bangdao. "Using human interactive security protocols to secure payments". Thesis, University of Oxford, 2012. http://ora.ox.ac.uk/objects/uuid:f73a0165-410f-4a69-a56c-b6f004253ba3.
Pełny tekst źródłaDold, Florian. "The GNU Taler system : practical and provably secure electronic payments". Thesis, Rennes 1, 2019. http://www.theses.fr/2019REN1S008/document.
Pełny tekst źródłaWe describe the design and implementation of GNU Taler, an electronic payment system based on an extension of Chaumian online e-cash with efficient change. In addition to anonymity for customers, it provides the novel notion of income transparency, which guarantees that merchants can reliably receive a payment from an untrusted payer only when their income from the payment is visible to tax authorities. Income transparency is achieved by the introduction of a refresh protocol, which gives anonymous change for a partially spent coin without introducing a tax evasion loophole. In addition to income transparency, the refresh protocol can be used to implement Camenisch-style atomic swaps, and to preserve anonymity in the presence of protocol aborts and crash faults with data loss by participants. Furthermore, we show the provable security of our income-transparent anonymous e-cash, which, in addition to the usual anonymity and unforgeability proper- ties of e-cash, also formally models conservation of funds and income transparency. Our implementation of GNU Taler is usable by non-expert users and integrates with the modern Web architecture. Our payment platform addresses a range of practical issues, such as tipping customers, providing refunds, integrating with banks and know-your-customer (KYC) checks, as well as Web platform security and reliability requirements. On a single machine, we achieve transaction rates that rival those of global, commercial credit card processors. We increase the robustness of the exchange—the component that keeps bank money in escrow in exchange for e-cash—by adding an auditor component, which verifies the correct operation of the system and allows to detect a compromise or misbehavior of the exchange early. Just like bank accounts have reason to exist besides bank notes, e-cash only serves as part of a whole payment system stack. Distributed ledgers have recently gained immense popularity as potential replacement for parts of the traditional financial industry. While cryptocurrencies based on proof-of-work such as Bitcoin have yet to scale to be useful as a replacement for established payment systems, other more efficient systems based on Blockchains with more classical consensus algorithms might still have promising applications in the financial industry. We design, implement and analyze the performance of Byzantine Set Union Consensus (BSC), a Byzantine consensus protocol that agrees on a (super-)set of elements at once, instead of sequentially agreeing on the individual elements of a set. While BSC is interesting in itself, it can also be used as a building block for permissioned Blockchains, where—just like in Nakamoto-style consensus—whole blocks of transactions are agreed upon at once, increasing the transaction rate
Pourghomi, Pardis. "Managing near field communication (NFC) payment applications through cloud computing". Thesis, Brunel University, 2014. http://bura.brunel.ac.uk/handle/2438/8538.
Pełny tekst źródłaBudrionis, Andrius. "Elektroninės komercijos saugumas". Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20110709_152449-66284.
Pełny tekst źródłaThe work deals with electronic payment models used in the market and their security problems. As electronic transactions operate with important and confidential data, ensuring higher level of security is always an actual issue. The study generally concerns the main electronic payment schemes (direct payment and payment through Paypal), their safety principles, technical decisions and security ensuring gaps. Considering the current market needs and information security gaps in current eCommerce models, a new, ensuring higher level of security in electronic payments, model was designed and a prototype of this decision was implemented. The prototype design and implementation may be used as recommendations for developers, improving electronic payment security models.
Pant, Shristi. "A SECURE ONLINE PAYMENT SYSTEM". UKnowledge, 2011. http://uknowledge.uky.edu/cs_etds/1.
Pełny tekst źródłaCapper, D. J. S. "Debt enforcement : the struggle to secure payment". Thesis, Queen's University Belfast, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.431478.
Pełny tekst źródłaDeng, Ni. "A secure, payment-based email delivery system". CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2909.
Pełny tekst źródłaKovan, Gerry. "SPP Secure Payment Protocol: Protocol Analysis, Implementation and Extensions". Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1079.
Pełny tekst źródłaTéllez, Isaac Jesús Augusto. "Design of secure mobile payment protocols for restricted connectivity scenarios". Doctoral thesis, Universitat Politècnica de Catalunya, 2012. http://hdl.handle.net/10803/96918.
Pełny tekst źródłaCheong, Chi Po. "Efficient and secure card-based payment system based on ANSI X9.59-2006". Thesis, University of Macau, 2007. http://umaclib3.umac.mo/record=b1684528.
Pełny tekst źródłaBjurling, Patrik. "Design and Implementation of a Secure In-app Credit Card Payment System". Thesis, Linköpings universitet, Institutionen för datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-112745.
Pełny tekst źródłaTallaros, Andrea Elia. "B-Mule: A Blockchain based Secure Data Delivery Service". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/24899/.
Pełny tekst źródłaGuler, Sevil. "Secure Bitcoin Wallet". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177587.
Pełny tekst źródłaEl, Madhoun Nour. "Towards more secure contact and NFC payment transactions : new security mechanisms and extension for small merchants". Thesis, Sorbonne université, 2018. http://www.theses.fr/2018SORUS168.
Pełny tekst źródłaEMV is the standard implemented to secure the communication, between a client’s payment device and a PoS, during a contact or NFC purchase transaction. It represents a set of security messages, exchanged between the transaction actors, guaranteeing several important security properties. Indeed, researchers in various studies, have analyzed the operation of this standard in order to verify its reliability: unfortunately, they have identified several security vulnerabilities that, today, represent major risks for our day to day safety. Consequently, in this thesis, we are interested in proposing new solutions that improve the reliability of this standard. In the first stage, we introduce an overview of the EMV security payment system and we survey its vulnerabilities identified in literature. In particular, there are two EMV security vulnerabilities that lead to dangerous risks threatening both clients and merchants: (1) the confidentiality of banking data is not guaranteed, (2) the authentication of the PoS is not ensured to the client’s device. Therefore, our interests move in the second stage to address these two weaknesses. We first review a selection of the related works that have been implemented to solve these vulnerabilities, and then, in order to obtain better results than the related works, we propose a new secure contact and NFC payment system that includes four innovative security mechanisms. Finally, in the third stage, we adapt our first security mechanism in the context of a new NFC payment architecture. This architecture is especially destined for small merchants, allowing them to take advantage of their NFC smartphones for use directly as NFC readers
Foo, Ernest. "Strategies for designing efficient electronic payment schemes". Thesis, Queensland University of Technology, 2000.
Znajdź pełny tekst źródłaKrob, Jakub. "Platební systémy na Internetu". Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-10576.
Pełny tekst źródłaUsman, Arshad. "The effect of product price and product category on online payment methods and on the decision to own the secure server". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape8/PQDD_0006/MQ43349.pdf.
Pełny tekst źródłaUsman, Arshad Carleton University Dissertation Engineering Systems and Computer. "The Effect of product price and product category on online payment methods and on the decision to own the secure server". Ottawa, 1999.
Znajdź pełny tekst źródłaSaparov, Pavel. "Elektronické platební systémy". Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-112682.
Pełny tekst źródłaCahová, Pavlína. "Bankovní klient a jeho ochrana v českém právním systému". Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-11115.
Pełny tekst źródłaZarli, Meiffret Delsanto Kristel. "La fraude en droit de la protection sociale". Thesis, Aix-Marseille, 2016. http://www.theses.fr/2016AIXM1035.
Pełny tekst źródłaThe profound deficit of social finance has legitimised the development of an arsenal against fraud. Traditional penal sanctions, which are partially harnessed, now interact with administrative sanctions. Their complementarity offers a proportionate response. This diversification of enforcement policy does not however bring into question the rights of users due to the influence of the principles of punitive law. The social security bodies’ means of detection are also suited to handling the variety of fraudulent situations. Debt recovery agencies as well as social security bodies providing services are involved. The provider bodies now assume their part in the monitoring of the issuing of benefits. Controls are indeed no longer just for debt recovery agencies. Gradually, the general prerogatives of controls have converged and have been reinforced, sometimes to the detriment of the guarantees of users .The legislative tools in favor of cross-referencing information have multipled to increase the means of detection. If in particular they pose legal bases that are useful in detecting network frauds, they also entail, on a wider scale, a modernisation of the functioning of the organisations that is compatible with the rights of users. Ultimately, at the cost of a few developments, ressource protection and user rights may, under the supervision of judges, no longer be opposed. In the meantime, they are reconcilable, if not completely reconciled. In particular, a single definition is necessary since the legal security of users and consistency of the mechanism depends upon it
Chapon-Le, Brethon Aurélie. "Le principe d'égalité entre créanciers". Thesis, Normandie, 2019. http://www.theses.fr/2019NORMR088.
Pełny tekst źródłaSince ancient times, equality between creditors appears to be the core principle of insolvency proceedings. It allows for a fairly sharing of the debtor's assets. However, existence and scope of that application standard are persistently contested. Many reforms, new economic orientations of the subject, added to the increasing place that securities law takes and the globalization of procedures have contributed to strengthen the debate around creditor's rights. Discussions about equality in the insolvency law though disclose a specific problem, due to an inadequate definition of equality principle in insolvency proceedings. More than anything, the concept of equality is ambivalent ; therefore, a single meaning for the principle is unmanageable. Furthermore, equality between creditors is not a plain rule but represents a full-fledged principle of law. That higher nature requires to be enforced at each stage of proceedings. In spite of subsequent amendments, the principle of equality between creditors appears to be the cornerstone of insolvency law. Traditional elements of the collective discipline remain and apply equality to all creditors. Development for differentiated treatments do not systematically lead to an unwarranted breach of equality. The breach of formal equality is accepted if the schemes carry out the proceedings objectives, or aim for protection of the best interests. Strong critics concerning the principle, and challenges about the expression are not unfounded for most. The legislator staged a number of unjust privileged treatments, with the aim of satisfying the personal interest of a few creditors. However, compliance with equality is essential in bankruptcy law for the purposes of sharing the assets and liabilities of the debt, and strengthen the imperative of moralization in business law
Chiu, Shin Jung, i 邱信榮. "A Review of Secure Environments for Electronic Payments in Interbet". Thesis, 1996. http://ndltd.ncl.edu.tw/handle/44209598147842251287.
Pełny tekst źródła國立交通大學
資訊管理研究所
84
The purpose of this thesis is to study security issues of electronicpayments over the Internet. In this thesis, the first topic is to compareSSL ( Secure Sockets Layer ) and S-HTTP ( Secure HyperText Transfer Protocol), the two communication security protocols proposed for being implementedin the session layer and in the application layer of TCP/IP, respectively. Then, the next topic is to survey and analyze the security issuesfor current Interent electronic payment systems including systems usingcredit cards, digital cash, and electronic checks. In particular, weevaluate the security of SET ( Secure Electronic Transaction ) , acredit-card based payment protocol over the Internet proposed by Visaand MasterCard in 1996. This draft proposal is likely to be adopted asa de facto standard internationally. Finally, we propose a prototypeas the infrastructure of Internet electronic payment systems in our country.
Hsu, Ya-Ting, i 許雅婷. "A Secure Mobile Payment Business Model". Thesis, 2013. http://ndltd.ncl.edu.tw/handle/12736094655793330861.
Pełny tekst źródła國立東華大學
資訊工程學系
101
Due to the rapid development of mobile technology and mobile phone applications, consumption patterns have been changing from commerce to E-commerce, and to M-commerce. This represents that the evolution of M-commerce has achieved locations mobility in time. With a smart phone, M-commerce may occur any time, any place. Mobile payments have brought people a more convenient way of payments. In addition to paying by cash, check, or credit cards, customers can now use their mobile devices to pay for a wide range of services. However, customers’ security concerns are a major barrier to broad adoption and use of mobile payments. This thesis presents the design of a secure mobile payment business model in which access control is based on a service-oriented architecture. QR Codes combine with encryption algorithms, signature and XACML server of a bank. Personal data and purchase details are stored into an XML transaction file and then transferred to the server. A customer uses his/her mobile device to get authorization from a remote server and generate a QR Code as the payment certificate. This mechanism allows customers to feel secure in using mobile payment.
Chien, Hsu Ho, i 徐和謙. "Design of Secure Electronic Payment System". Thesis, 2001. http://ndltd.ncl.edu.tw/handle/89804070359588086704.
Pełny tekst źródłaLiao, Jen-Yi, i 廖仁億. "A Study on Intelligent Secure Electronic Payment Systems". Thesis, 2001. http://ndltd.ncl.edu.tw/handle/80875130318934707743.
Pełny tekst źródła大葉大學
資訊管理研究所
89
At present, electronic payment systems activities constructed on the Internet mainly employ the certificate-based public key cryptosystem to solve their related security issues. But it is based on the condition that the certificate authority (CA) must be honest and need to manage the key directory. Furthermore, it needs to spend extra time to verify the signature signed in the digital certificate by the CA. In practical environments, the CA is not absolutely honest, and it is possible for a hacker to intrude it. Therefore, we have developed efficient self-certified schemes instead of using digital certificates. The proposed schemes can prevent the CA from intervening in the transactions between web sites and customers, and they can authenticate their identities each other without the help of CA. For the considerations of efficiency, the proposed intelligent electronic payment systems are developed by using elliptic curve cryptosystems instead of modular exponentiation, because it possesses faster computation and fewer bits achieving the same security level as other public key cryptosystems, like the RSA cryptosystem. In summary, in the thesis we have designed a session key exchange scheme, a digital signature scheme, and a blind signature scheme for the e-cash based payment systems using the self-certified public key cryptosystem based on elliptic curve cryptosystems. The proposed schemes make on-line electronic payment systems securely workable.
Laih, Shun-Wanq, i 賴樹旺. "A Study on the Secure Electronic Payment System". Thesis, 1997. http://ndltd.ncl.edu.tw/handle/06834393271404636573.
Pełny tekst źródła國立台灣工業技術學院
電子工程技術研究所
85
Under the extraordinary growth of international interconnected computer networks, the paperless society is coming true soon. Both cash and checks will be processed in electronic form. Money will be only a lot of electronic data that have been manipulated by the bank. Unfortunately, electronic cash and electronic check systems are under the threats derived from financial crime. In this thesis, some effective methods are proposed for secure electronic payment systems that include (1) electronic cash system without overspending, (2) secure electronic check system, and (3) network fund transfer. In electronic cash, we present how a smart card can be incorporated in the protocols to provide prior restraint against overspending by the customer, instead of just detection after the fact. A withdrawal counter and a payment counter are inside the smart card. Before payment, the smart card first checks whether the accumulated amounts of the payment counter are less than the withdrawal amounts. If yes, then the customer can pay electronic cash for this consume. In addition, we arrange the digital signature scheme in smart card. By this two concepts, we accomplish the goal that the customer can not spend more electronic cash than withdrawn by the customer. To secure electronic check, we use the method that system operations of which based on paper check. A current payee can verify the previous digital signatures. Owing to different computable complexity, we present how every previous signature and composite previous signatures can be verified. The payee also sends received electronic check to the bank for verifying. By this method, we can establish a traceable, unforged and unduplicated electronic check system. Furthermore, the secure electronic cashier*s check is also discussed. Finally, the method of network fund transfer is proposed. In this method, we adopt digital signature and challenge/response protocols to prevent replay attack and cheating. It makes people who are legal and authorized can take advantage of world wide web to conduct funds transfer safely.
Lin, Wen Te, i 林紋德. "Design of Secure Payment Protocol with NFC Mobile Devices". Thesis, 2009. http://ndltd.ncl.edu.tw/handle/27143238261109358697.
Pełny tekst źródła長庚大學
資訊管理學研究所
97
Due to the development of wireless communication networks in recent years, construction of network environment has become more flexible and the way of using network has also become more mobile. In addition, under government and other related organizations aggressively advertised projects of M-Taiwan and U-Taiwan, wireless communications network has became popular in Taiwan, which brings in unlimited business opportunities of mobile commerce and the development of mobile payment solutions. International and domestic telecommunication and mobile phone providers propose many solutions for mobile payment, which support not only B2C mobile payment model but also C2C model such as PayBox and PayPal. With the popularity and maturity of mobile phone, and the Near Field Communication (NFC) technology that is developed in recent years, consumers are especially interested in the function of integrating multiple cards and utilizing the mobile phone for daily shopping. The needs for and development of mobile payment enable the innovation and upgrade of mobile device and business model. However, security problems of mobile payment such as authentication of trading parties, confidentiality of payment information, security channel establishment, and consumers’ privacy arise constantly and need to be solved. According to the above mentioned security issues, this thesis proposes a Wireless Public Key Infrastructure (WPKI) based NFC mobile payment protocol (NMPP) in which two payment scenarios are supported. B2CNMP is designed to fit the current B2C model, and C2CNMP enables people to pay each other with credit card. The proposed NMPP can ensure the necessary of authentication, confidentiality, integrity, non-repudiation, and personal privacy in transaction for the future NFC mobile payment. Finally, the proposed protocols will be compared with other related works to analyze the security and performance, and a prototype system will be implemented by using NFC equipment to show the simplicity and feasibility features of NMPP.
Chen, Chiu, i 陳丘. "A Secure and Anonymous Payment Mechanism in Mobile Environment". Thesis, 2005. http://ndltd.ncl.edu.tw/handle/23744642824204790233.
Pełny tekst źródła世新大學
資訊管理學研究所(含碩專班)
93
In the 21 century, the electronic commerce becomes a famous business model. The business model in the cyber environment is popular among consumers today. However, one of the questions which consumer concern about is privacy of the payment system. Business man usually supply the sales promotion and activity of personally sales, but the over amount of the advertisement may cause torment to the consumer. Therefore, the consumers gradually pay much attention to the anonymous transaction. Moreover, with the expectable growth in the mobile commerce, it has a great progress to the efficiency, portable and the bandwidth limit of the mobile device such as PDA, mobile phone…etc, the attach function and valued service are also wild provided. According as the variety of mobile service, it will be one of the main payments in the days to come. Owing to the mobile payment is shaping, it will be broaden its scope of service. As results of most literatures of mobile payment are focus on non-anonymous system, we propose a solution and tried to replace the existence of non-anonymous payment system in the mobile environment. This research tries to propose a new payment mechanism which establish a fair, security and anonymity to deal with electronic payment system. Our anonymous payment mechanism not only supplies vested interests of telecoms, but also merchants and bank, as well as guarantees the right of privacy to the consumers. This research uses hash chain and XOR operation to let the mechanism with low computation cost, symmetric and asymmetric cryptosystem to ensure safety. To considering the payment in visited domain, this mechanism is not only performed in the home domain, but also can be performed in visited domain. Therefore, our mechanism providing consumers an increased security environment for transactions, convenient operate, and protect anonymous mobile payment system.
Zih-Yuan, Meng, i 孟子元. "A Secure Payment Protocol For Mobile Commerce Based On ECC". Thesis, 2004. http://ndltd.ncl.edu.tw/handle/14970021692305413194.
Pełny tekst źródła長庚大學
資訊管理研究所
92
With the popularization of the Internet, Electronic Commerce (E-Commerce) grows vigorously. After that, the network strides forward to wireless, and it promotes the development of Mobile Commerce (M-Commerce). At present, the M-Commerce has already become the newest trend after E-Commerce. More and more services on Internet have been transferred to wireless environment; for instance, on-line floristic shop, inquiry of train schedule and ticket booking, and inquiry of stock quotes, etc. Because M-Commerce is the paradigm shift based on the structure of E-Commerce, it inherited the security issues about the four flows, including the information flow, business flow, cash flow and distribution flow, of E-Commerce. Especially under the wireless environment, most people worry about the information flow and cash flow. It is because that when attacked by the hacker, the influence of these two flows on consumers is the most serious. The wireless network has the characteristics of freedom and mobility. Because of breaking through the geography limit of wired network, it is weaker when the data were transmitted under unauthorized access and attack. The development of modern cryptography is nearly 30 years since Diffie and Hellman proposed "Diffie-Hellman Key Agreement Protocol", and the security problems on wired network are solved .in succession. WAP Forum, in view of this, attempted to apply public-key cryptographic systems, encrypted key exchange protocols and digital signature techniques on the wireless network. Therefore, "Wireless Public Key Infrastructure (WPKI)" was born in A.D. 2000. This research is based on Elliptic Curve Cryptography (ECC), and combines authentication mechanism and proxy signature scheme to propose a secure mobile payment protocol based on WPKI. We show that the proposed protocol is efficient, secure and convenient, and we hope that this research can put forward a different solution for M-Commerce.
LIN, WEI-TING, i 林威廷. "Disposable Verification Code Secure Electronic Transaction System for Mobile Payment". Thesis, 2018. http://ndltd.ncl.edu.tw/handle/w8qkv3.
Pełny tekst źródła南臺科技大學
資訊管理系
106
This research is about discussing the current process of secure electronic transactions and improving the transaction model through efficiency and security, which are the features of electronic transactions. In order to increase the payment process efficiency of mobile payment and the securities of traditional electronic transactions, this research proposes a strategy of one-time barcode key certificate system. Based on Android mobile operating system and Eclipse cross platform, this research developed a system of secured payment of mobile transactions. Consumers can use the one-time barcode generated from mobile devices to complete purchase. The information contained in QR Code are certificate cipher text when transactions verifying and payment time. The certificate cipher text are encrypted as the time of processing transactions with private key, therefore two dimensional barcode will change under circumstances of different transacting time. When the seller scans the barcode and acquires information of the purchaser, the information will be delivered to payment gateway for verification and sent to the acquirer for requiring authorization of processing transactions after the information is verified, the transaction will be completed when the authorization is permitted. This system assures the barcode is transported securely in effective transaction time, even though the barcode is misused or skimming by criminals, the information of barcode holders will not be released into public. This research simplifies the transaction process that was used to be complex and increase the efficiency to complete transactions and in the mean while the security of transaction processing.
Hung-Yueh, Chen. "A Secure Mobile Electronic Payment Architecture for Heterogeneous Wireless Mobile Networks". 2006. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-0307200623015000.
Pełny tekst źródłaHUANG, JIA-WEI, i 黃嘉偉. "A Study of Secure Payment Protocols for NFC-enabled Mobile Phones". Thesis, 2016. http://ndltd.ncl.edu.tw/handle/5dzx9f.
Pełny tekst źródła朝陽科技大學
資訊管理系
105
Although NFC mobile payment is fruitful and useful, security and customer privacy are of great concern to users. For example, attacks like identity impersonation, eavesdropping, and replaying might occur, also personal information and finance conditions could be exposed during payment transactions. Many protocols have been presented to solve these problems by using multiple times of encryptions and digital signatures times for higher security. However, the complicated computations introduce overheads and generate inefficient operations for these protocols. And then, those protocols have not concern consumer privacy problem clearly. We discuss those proposed protocols from literature and find out the advantage and weak point. And looking for the useful security technology to design the secure mobile payment protocol. Not only concern information security of the payment but also concern efficiency and consumer privacy problem. After design the protocols, we will analyze the protocol. And try to explain the protocol is secure and efficient that can defense common attack and cost a low computations. We also try to use the anonymous methods to solve the consumer privacy problem.
Chen, Hung-Yueh, i 陳宏岳. "A Secure Mobile Electronic Payment Architecture for Heterogeneous Wireless Mobile Networks". Thesis, 2006. http://ndltd.ncl.edu.tw/handle/44361695397568144060.
Pełny tekst źródła國立臺灣大學
資訊工程學研究所
94
When the basic functionalities of heterogeneous wireless mobile networks have been in place, network operators are interested in creating value-added mobile applications due to the high demand of electronic trading over the wireless networks or mobile commerce (m-commerce). A good solid secure and robust trading model is needed in order to attract more users (customers) of mobile applications. This paper proposes and implements a secure trading platform named Mobile Electronic Payment (MEP) for heterogeneous wireless mobile networks, which applies the emerging ID-based cryptography for key agreement and management. Our MEP platform attempts to alleviate the computational cost, reduce the memory space requirement in mobile devices and meet the requirements for secure trading: avoidance of overspending and double spending, the fairness, the user anonymity, and the privacy. Our design is transparent to the bearer networks and is of low deployment cost. We expect that our MEP provides a viable trading architecture for the future mobile applications.
Ku, Yen-Chiu, i 古炎秋. "A Transaction-Code and Secure-Mobile-Device Based Electronic Payment Mechanism". Thesis, 2003. http://ndltd.ncl.edu.tw/handle/45261599853810364723.
Pełny tekst źródła國立雲林科技大學
資訊管理系碩士班
91
Following the rapid advancement of electronic commerce, more and more consumers engage themselves in the Internet online transactions. However, even though many elec-tronic payment mechanisms, such as SSL and SET, intended to build a secure payment en-vironment, security is still one vital blocking factor in the widespread acceptance of elec-tronic commerce. Focusing on balancing the tradeoff between security and convenience without the prerequisite that the user must be using a secure computer, a transaction-code and secure-mobile-device based electronic payment mechanism is proposed in this paper. The proposed mechanism has the following advantages: (1) the security of a consumer’s computer is immaterial; (2) the credit card number is not used in the transaction; (3) the use of transaction code reduces the risk of credit card frauds; (4) the mechanism is privacy preserving; (5) the consumers can engage in transactions with ordinary browsers and mobile devices. Through analysis and comparison, the proposed mechanism is shown to provide privacy and mobility.
Yu, Tsung-Che, i 余宗哲. "A Study for Secure Group Mobile Electronic Payment for MBMS Service". Thesis, 2011. http://ndltd.ncl.edu.tw/handle/17516518099125247432.
Pełny tekst źródła國立臺灣大學
資訊網路與多媒體研究所
99
With the vast development and deployment of wireless mobile networks, more and more users enjoy the mobile applications over the mobile networks. To maintain the QoS, the mobile payment model should supportMBMS and still ensure the transaction security. In this paper, we design a secure multicast-based mobile electronic payment model, named Group Mobile Electronic Payment (GMEP). GMEP inherits the advantages of micropayment and guarantees the requirements of multicast secrecy.
Lee, Chia-En, i 李嘉恩. "A Secure and Convenient Mobile Credit Payment Scheme Using Public Personal Information". Thesis, 2003. http://ndltd.ncl.edu.tw/handle/289be9.
Pełny tekst źródła逢甲大學
資訊工程所
91
There is no denying that the Internet starts to permeate and grow on society at a rapid pace. It becomes another important part of people’s lives beside the telephone and television. One significant feature of the Internet is that it is a worldwide service. Enterprises or merchants can sell their products or contents online and potentially attract many consumers around the world. Consumers use the Internet to shop, make an order for goods and pay for what they bought. The solutions for E-Commerce proceeding are called E-payment schemes such as SET, SSL, e-Cash, e-CHECK and so on. Currently, most consumers use their credit cards to pay for their online transactions. But the present challenge for consumers’ private protections is that how safe it is to transmit credit card information via the Internet? As we know, credit card frauds on the traditional payment environment are certainly threatening to consumers and merchants alike. The same situation may take place again here in E-payment schemes. Notwithstanding the advantages of these E-payment schemes, none of them can satisfy the requirement of usefulness, ease of use and secure at the same time, in other words, consumers are still not willing to adopt these E-payment schemes. Thus, in this paper, our aim is to propose a practical E-payment scheme with public personal information instead of using private credit card number and, simultaneously, to find a balance among security, convenience and usability. Moreover, we proposed a practical solution and tried to replace the existence of credit card by using the handy mobile phone, therefore empowering and providing customers an increased security environment for transactions and a convenient practicality for daily life.
Shi-Ming, Vincent, i 黃士銘. "Provably Secure Privacy Mechanism for Authentication, Billing and Payment in Mobile Communications". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/34762147882564692715.
Pełny tekst źródła國立中山大學
資訊工程學系研究所
98
Mobile communication is very mature today due to the powerful computation and communication capabilities of mobile devices, the flourishing of mobile networks, the popularity of electronic commerce, and the completeness of e-payment mechanisms. It is a pleasure for mobile users to roam around the mobile networks and enjoy the mobile network services. However, there are a lot of security threats in the mobile networks, and thus we need an anonymous mutual authentication and key exchange scheme to guarantee the security and privacy for mobile users in the networks. A payment protocol is also required for charging the mobile users after using the mobile services. However, the existing payment schemes do not support anonymity and credit-based chargeability at the same time. In this dissertation, we propose a secure authentication scheme such that the mobile users can be anonymously authenticated by the system and the system can still make correct charge to these anonymous mobile users via a credit-based way simultaneously. We also propose a novel e-cash scheme which can support each mobile user to withdraw a generic e-cash and decide to spend it as an on-line e-cash or an off-line e-cash according to the payment requirement of the anonymous authentication scheme. Our proposed schemes are convenient and flexible for the mobile users, the system operator, and the bank. Besides, full privacy can be achieved for mobile users owing to the combination of our proposed schemes, which can be performed in current mobile devices efficiently with few battery energy consumptions. Furthermore, we provide anonymity control, no swindling, tamper resistance, secure mutual authentication, secure key exchange, and secure forward secrecy in the proposed anonymous authentication scheme and the e-cash scheme, where these security features are demonstrated by formal security models and theoretical proofs.
Lai, Ya-yun, i 賴亞筠. "A Study of Secured Transaction on Third Party Payment Model". Thesis, 2012. http://ndltd.ncl.edu.tw/handle/q9zbjd.
Pełny tekst źródła國立臺灣科技大學
財務金融研究所
100
The rapidly growing popularity of network applications, internet consumers, online shopping, and online auctions have fueled to change people's consumption habits. However, internet shopping still possesses high risk level in security compare to physical shopping. Websites of various sizes, hacker attacks, the theft of a capital, and the overall network security environment are of everyone's concern, especially given the cases of Internet shopping fraud event and transaction disputes heard. In this study, third party profile analysis and case study will summarize the key elements contributing to the success of third-party payment platform. It can then be used to compare with the traditional internet payment model. In this study, the research method is based on the Internet business model as proposed by scholars in the past, the establishment of a logical analytical framework, including the development process, the main products and services, the customer value proposition, revenue model, business model and key resources and processes. This framework applied to three cases of third-party payment of the secured transactions, which can be used to analyze its core competencies. This study explores on the issues of trust in online transactions, aiming to identify the key success points in third-party payment model, its common core competence, and key resources processes. Secondly, looking to find ways to provide more values to the end user, identify correct pricing strategy, search for who and where are the big clientele, and to implement multiple security safeguards. The biggest difference between third-party payment mode and traditional mode of network payment is that the function of "secured transactions". Lastly, I hope to take this research to help the development of Taiwan's third-party payment industry and to enhance their competitiveness.
Lau, Chi-Kin, i 劉子健. "NSEP: A Novel Secure Micro Electronic Payment Model for the Next Generation Wireless Networks". Thesis, 2013. http://ndltd.ncl.edu.tw/handle/60308405932902846912.
Pełny tekst źródła國立臺灣大學
資訊網路與多媒體研究所
101
In the next generation wireless networks, heterogeneous network technologies (e.g., UMTS, LTE, WiMAX, and WiFi) coexist to provide users communications services. Users may use different terminals to access different Internet applications through different communication services simultaneously. The applications and communication services are owned by different operators. Users obtain the services/applications by making payments to their subscribed networks. Prepaid is one of the payment models, which ensures that users do not overuse the communication service or applications within limited credits. How to apply the prepaid model in the next generation networks such that user''s credits can be securely distributed among different operators to support user''s usage of different services at the same time is challenging. For the challenge, in this paper, we propose NSEP (A Novel Secure Micro Electronic Payment Model). We prove NSEP satisfies the security requirements and analyze the performance of NSEP in terms of signaling overhead.
Chun-Yung, Chien, i 簡俊永. "A STUDY ON DELAY PAYMENT FORCAST MODEL OF REAL ESTATE SECURED LOAN". Thesis, 2006. http://ndltd.ncl.edu.tw/handle/22066779844125344378.
Pełny tekst źródła國立高雄應用科技大學
商務經營研究所
94
This paper real estate secured loan one from A.D. 2000 to 2003 of specialized bank of guaranteed loan of house as the target , the situation divides the family in breach into the normal family and exceeds the time limit to stop the paying of the debtor, and with the sex, age, marital status, academic credentials, mode of repayment, the rates of total debt and annual income, room age , area of the house , security position, grant the loan to count , whether the special project grants the loan, while granting the loan, interest rate, amount of money of the loan, whether borrower and loan have geo- relations to walk, whether borrower and security have geo- relations, job, whether related guarantor has, annual income, annual surplus , always in debt, the collateral is owned by me, the collateral is owned by spouse, walk storehouse and security have geo- relation , market price , valuation , day house and apartment building completely , for purchase house and research parameter of checking and approve the authority etc. carry on the discussion, and carry on Logistic Regression Model analysis of the parameter screened . This research paper passes all primitive parameters square independent character examination (P value <0.05 ) and parameter chosen after alternate analysis are established as Logistic Regression Model (1 ), is it is it study aforesaid research parameter that choose parameter too strict and lose kind parameter to choose to avoid another, aforesaid all parameter that choose, so long as value, examination P of square independent character, <0.25 research parameter include in , and the parameter after screening with Stepwise is established as Logistic Regression Model (2 ), through comparing Logistic Regression Model (1)And the model of Logistic Regression Model (2 ) fits excellent degree assay, predict accuracy and predict ability wholly, among them every index of Logistic Regression Model (2 ) is more excellent than Logistic Regression Model (1 ) , among them the whole prediction ability of Logistic Regression Model (2 ) is up to 94.1% 93.7% slightly higher than Logistic Regression Model (1 )s, so regard Logistic Regression Model (2 ) as the risk of making loans finally and assess the way, and assess the way and examine 35 cases of guaranteed loan family of house of A.D. 2004 with the loan risk of this Logistic Regression Model (2 ), predict that the ability rate is up to 75%, can offer the bank to judge the basis effectively completely.
Lee, Chi-Hao, i 李志豪. "A Factoring and Discrete Logarithm Based Fair Blind Signature and Its Application on the Design of a Secure Electronic Payment System". Thesis, 2002. http://ndltd.ncl.edu.tw/handle/8auz2v.
Pełny tekst źródła逢甲大學
電子工程所
90
The security of most previously suggested public-key cryptographic systems is based upon a single computationally hard problem, such as the factoring problem or the discrete logarithm problem etc. however, they will no longer be secure if the corresponding hard problem is solved in the future. A significant solution to the problem is to develop cryptographic systems whose securities are based on solving several different hard problems simultaneously. In 1998, Shao proposed two signature schemes and claimed that their securities are based on both the factoring problem and the discrete logarithm problem. Nevertheless, it was shown by Lee in 1999 that Shao’s schemes can be broken if one can only solve the factoring problem. In this thesis, we first give an improvement of Shao’s schemes and show that the presented scheme is indeed secure unless both the factoring problem and the discrete logarithm problem are solved simultaneously. Based upon the presented improvements. We further proposed the first fair blind signature of which the security is also based on computing both the factoring problem and the discrete logarithm problem simultaneously. Blind signatures provide two interesting properties: blindness (i.e., the signer shouldn’t have any idea about the content of messages he signs) and unlinkability (i.e., when the signer gets the message and the signature later, he can’t learn or trace when or for whom this signature is produce). Accordingly, blind signatures are often used in anonymous digital payment applications. However, due to the unlinkability property, such payment systems could be misused by criminals, e.g., to safely obtain an ransom or to launder money. Fair blind signatures are then developed to cope with the misuse of unlinkability. They have the additional property that, with the help of a trusted entity, it is possible for the signer to link his view of the protocol and the message-signature pair. Accordingly, based upon our proposed fair blind signature, we finally develop a new digital payment system. It is pointed out that our developed system is more flexible and robust than other previously suggested systems.
Κέντρος, Σωτήριος. "Ανοιχτή πλατφόρμα για την ασφαλή ανταλλαγή πληροφορίας σε περιβάλλον κινητών επικοινωνιών". Thesis, 2008. http://nemertes.lis.upatras.gr/jspui/handle/10889/1497.
Pełny tekst źródłaThe scope of this master thesis is the design of a system for secure data transfer from mobile terminal devices like cellular phones and PDAs (Personal Digital Assistants). Such a system could be used for the transmission of critical personal data, like biomedical data collected from biosensors, or the completion of electronic payments. In this work we present the state of the art in mobile telephony and communication protocols for networking in a mobile environment, also we present some basic cryptographic protocols, in order to design the wanted system. Finally, we develop and present an electronic payments system, based on the system for the secure exchange of information in the mobile communications environment we designed before, implementing in this way an application for the suggested system.
Martins, João Pedro Vargas Carinhas de Oliveira. "Os suprimentos no financiamento societário: uma abordagem funcionalista". Master's thesis, 2010. http://hdl.handle.net/10071/6365.
Pełny tekst źródłaLimited liability companies form the backbone of our modern economy given the fact that most of the economic activity is carried out through them. This is no accident. In fact, limited liability companies possess certain legal characteristics that make them particularly suitable as business vehicles for the production of goods and services for the market. However, on the other hand, these same characteristics give rise to a persistent risk of opportunistic behavior on the part of shareholders and/or directors vis-à-vis the company itself, company creditors and other shareholders. These situations are known as agency problems and, unless contained under certain limits, they are capable of putting at risk the company form and its positive net effects as a business vehicle. It is company law´s task to provide for a regulatory framework which is apt to cope with these agency problems. In this work, we seek to demonstrate that the portuguese legislature was sensitive to these kinds of problems when it regulated the equity-substituting shareholder credit. We have chosen this topic because we believe that it is perfectly suitable to cause the appearance of all the agency problems above mentioned and, thus, a good means to test the agency theory and how the law might deal with it in order to prevent value-reducing forms of opportunism. After studying the contractual regime as envisaged by the legislature and the qualification of the situations that might be considered equity-substituting shareholder credit, we proceed to the analysis of the regulatory implications of this kind of shareholder credit. This will start from the premise that its goal is to deal with the described agency problems, having, thus, a functional (instrumental) nature. In the course of this analysis it will be taken in due account the European Court of Justice Jurisprudence regarding the freedom of establishment and its implication regarding our subject matter. A warning should also derive from this work: an excess of regulation might itself be a source of value reducing.
Meng, Maurice. "L'affaire Marché central : description et analyse d'une fraude immobilière de grande envergure". Thèse, 2007. http://hdl.handle.net/1866/7398.
Pełny tekst źródła