Добірка наукової літератури з теми "Security of payment"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Security of payment".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Security of payment"
Hassan, Md Arif, Zarina Shukur, Mohammad Kamrul Hasan, and Ahmed Salih Al-Khaleefa. "A Review on Electronic Payments Security." Symmetry 12, no. 8 (August 12, 2020): 1344. http://dx.doi.org/10.3390/sym12081344.
Повний текст джерелаVishwakarma, Pinki Prakash, Amiya Kumar Tripathy, and Srikanth Vemuru. "The Fact-Finding Security Examination in NFC-enabled Mobile Payment System." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 3 (June 1, 2018): 1774. http://dx.doi.org/10.11591/ijece.v8i3.pp1774-1780.
Повний текст джерелаKanzafarova, I. S., and M. S. Fedorko. "SECURITY (GUARANTEE) PAYMENT AS AN INNOMINATED ENFORCEMENT OF OBLIGATIONS." Constitutional State, no. 42 (July 7, 2021): 154–63. http://dx.doi.org/10.18524/2411-2054.2021.42.232419.
Повний текст джерелаPolovenko, Liudmyla, Svitlana Merinova, and Kateryna Kopniak. "The development of electronic payment systems in Ukraine and their security." VUZF Review 6, no. 2 (June 29, 2021): 146–52. http://dx.doi.org/10.38188/2534-9228.21.2.17.
Повний текст джерелаKovács, Levente, and Sandor David. "Fraud risk in electronic payment transactions." Journal of Money Laundering Control 19, no. 2 (May 3, 2016): 148–57. http://dx.doi.org/10.1108/jmlc-09-2015-0039.
Повний текст джерелаBhutta, Muhammad Nasir Mumtaz, Surbhi Bhattia, Mohammed Ali Alojail, Kashif Nisar, Yue Cao, Shehzad Ashraf Chaudhry, and Zhili Sun. "Towards Secure IoT-Based Payments by Extension of Payment Card Industry Data Security Standard (PCI DSS)." Wireless Communications and Mobile Computing 2022 (January 24, 2022): 1–10. http://dx.doi.org/10.1155/2022/9942270.
Повний текст джерелаTsai, Shuo-Chang, Chih-Hsien Chen, and Keng-Chang Shih. "Exploring Transaction Security on Consumers’ Willingness to Use Mobile Payment by Using the Technology Acceptance Model." Applied System Innovation 5, no. 6 (November 11, 2022): 113. http://dx.doi.org/10.3390/asi5060113.
Повний текст джерелаRabiah, Arbi Siti, Mochammad Fahlevi, Nendi Juhandi, and Pawit Winarto. "HARUSKAH E-PAYMENT TRUST DITERAPKAN E-COMMERCE SEBAGAI FAKTOR KEPUASAN KONSUMEN?" E-Jurnal Manajemen Universitas Udayana 9, no. 7 (July 3, 2020): 2724. http://dx.doi.org/10.24843/ejmunud.2020.v09.i07.p13.
Повний текст джерелаHuddin, Muhammad Nurhaula Huddin, and Khairul Ikhsan. "MOBILE PAYMENT SATISFACTION POST PANDEMIC COVID-19 IN INDONESIA." Jurnal Riset Akuntansi Dan Bisnis Airlangga 7, no. 2 (November 27, 2022): 1326–79. http://dx.doi.org/10.20473/jraba.v7i2.39834.
Повний текст джерелаXu, Ruohan. "Optimized Secure Payment Solution Using QR Code Scanning based on Operation-payment Dual Devices." BCP Business & Management 17 (February 23, 2022): 118–23. http://dx.doi.org/10.54691/bcpbm.v17i.383.
Повний текст джерелаДисертації з теми "Security of payment"
Huang, Enyang. "Automated security analysis of payment protocols." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/78140.
Повний текст джерелаCataloged from PDF version of thesis.
Includes bibliographical references (p. 173-182).
Formal analyses have been used for payment protocol design and verification but, despite developments in semantics and expressiveness, previous literature has placed little emphasis on the automation aspects of the proof systems. This research develops an automated analysis framework for payment protocols called PTGPA. PTGPA combines the techniques of formal analysis as well as the decidability afforded by theory generation, a general-purpose framework for automated reasoning. A comprehensive and self-contained proof system called TGPay is first developed. TGPay introduces novel developments and refinements in the formal language and inference rules that conform to the prerequisites of theory generation. These target desired properties in payment systems such as confidentiality, integrity, authentication, freshness, acknowledgement and non-repudiation. Common security primitives such as encryption, decryption, digital signatures, message digests, message authentication codes and X.509 certificates are modeled. Using TGPay, PTGPA performs analyses of payment protocols under two scenarios in full automation. An Alpha-Scenario is one in which a candidate protocol runs in a perfect environment without attacks from any intruders. The candidate protocol is correct if and only if all pre-conditions and post-conditions are met. PTGPA models actions and knowledge sets of intruders in a second, modified protocol that represents an attack scenario. This second protocol, called a Beta-Scenario, is obtained mechanically from the original candidate protocol, by applying a set of elementary capabilities from a Dolev-Yao intruder model. This thesis includes a number of case studies to demonstrate the feasibility and benefits of the proposed framework. Automated analyses of real-world bank card payment protocols as well as newly proposed contactless mobile payment protocols are presented. Security flaws are identified in some of the protocols; their causes and implications are addressed.
by Enyang Huang.
Ph.D.in the Field of Computer Engineering
Baqer, Khaled. "Resilient payment systems." Thesis, University of Cambridge, 2018. https://www.repository.cam.ac.uk/handle/1810/285001.
Повний текст джерелаMarais, Terrence K. "Electronic payment and security on the Internet." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52819.
Повний текст джерелаENGLISH ABSTRACT: The greatest potential worry that an on-line shopper has is what happens to his/her credit card details from the moment "submit" is pressed on the computer. Is it possible for someone on the Internet to intercept the message and use credit card details maliciously? Also, there is a lot of talk about personal details being encrypted, but how sure is one that this was indeed the case once "submit" has been pressed? Is there a way in which one can be sure that a transaction will occur only once? Many of the security issues are new and many experts are only learning how to deal with these now. This thesis offers suggestions and strategies a user can follow to minimize misuse and abuse of payment details. Electronic payment is the backbone of e-commerce, and the biggest threat towards widespread acceptance and usage of e-commerce is security. Many innovative solutions have been developed by vendors to address security issues. For example, the Secure Electronic Transfer (SET) protocol was developed to ensure that credit card transactions could be conducted safely and securely on the Internet. Secure Socket Layer (SSL) ensures that all communications and transactions are conducted in a tightly secure environment. This is critical for online or mobile banking and other financial activities. Others developments include payment systems that ensure that credit card details are never exposed to a merchant (e.g. SET), while some ensure that credit card numbers never enter the Internet. The five corner stones of security are confidentiality, privacy, authentication, integrity and non-repudiation. Authentication, non-repudiation and integrity can be resolved with digital certificates, digital timestamps and digital signatures. Message confidentiality, on the other hand, is ensured through the use of strong encryption. Encryption systems mutilate data or a message to such an extent that it is totally useless to someone who does not have the appropriate algorithm and key to decode it. The most widely used encryption schemes are the secret key and public key encryption systems. The public key cryptosystem generates two keys, called a public and private key. The public key can be made generally known, but the private key must be kept secret. A unique property of the scheme is that once data is encrypted with one key, only the corresponding other key of the pair can decrypt it. This makes it possible to address issues of authentication, integrity and non-repudiation. Traditional payment instruments such as cash, cheques, debit and credit card transactions are being replaced by their electronic equivalents. The driving forces behind these are transactional security, efficiency and speed. Novel payment solutions and strategies have been devised to meet the challenges of this new economy. For example, smart cards can act as an electronic purse that can hold electronic money. Other information, such as personal details, medical records, driver's licence, etc. can also be stored on the card. Whilst many security experts are in agreement that security is not a barrier anymore for wider usage of the Internet for financial transactions, many consumers are still apprehensive about how secure and safe it really is. This work aims to diminish those fears and show that the Internet is safe for business.
AFRIKAANSE OPSOMMING: Een van die grootste bekommernisse wat 'n kliënt met aankope op die Internet kan ondervind, is die onsekerheid wat presies gebeur nadat betalings aangegaan is en "Submit" is gedruk. Is dit moontlik dat iemand die boodskap kan onderskep en betaling besonderhede vir eie gebruik kan herwin? Daar is ook baie publisiteit oor kodifisering, maar hoe kan die klient verseker wees dat betalings besonderhede wel gekodifiseer is wanneer "Submit" gedruk was? Is daar 'n manier waarmee 'n mens verseker kan wees dat betaling slegs eenkeer gaan geskied? Baie van die sekuriteits lokvalle is nuut en sekuritiets kenners is tans besig om te leer hoe om die probleme te hanteer. Die werkstuk offer wenke en strategieë vir die verbruiker om die misbruik van betaling besondehede op die Internet te minimiseer. Elektronies betalings meganisme is die ruggraat van elektroniese besigheid, en die grootste struikelblok tot die grootskaalse gebruik daarvan is sekuriteit. Daar is baie innoverende oplossings om die probleme hok te slaan. By voorbeeld, die Secure Electronic Transfer (SET) protokol was ontwikkel om te verseker dat betalings met kredietkaart met hoë sekuriteit en veiligheid aangegaan kan word. Secure Socket Layers (SSL), verseker dat alle kommunikasies en transaksies in 'n sekuur en veilige omgewing plaasvind. Dit is veral krities wanneer die verbruiker gebruik maak van die Internet of vanaf selfone om transaksies aan te gaan met 'n bank. Ander ontwikkelinge sluit in betalings metodes wat verseker dat die handelaar nooit die kredietkaart besonderhede sien nie (bv. SET). Ander verseker weer dat die betalings besonderhede nooit oor die Internet hoef gestuur te word nie. Die vyf hoekstene van sekuriteit is konfidensialiteit, privaatheid, outentisiteit, integriteit en non-repudiasie. Outentisiteit, integriteit en non-repudiasie word opgelos deur die gebruik maak van digitale sertifikate, digitale tydstempels en digitale handtekeninge. Konfidensialiteit kan verseker word deur die boodskap te kodifiseer. Kodifikasie behels die verandering van data of boodskappe op so 'n wyse dat dit van geen betekenis is vir 'n persoon wat nie die korrekte algoritme en sleutel het om dit te dekodifiseer nie. Die geheime en publieke kodifiserings stelsels word die meeste gebruik om data te kodifiseer. Die publieke kodifiserings stelsel genereer twee sleutels, naamlik 'n privaat en publieke sleutel. Die publieke sleutel kan alom bekend gemaak word, maar die private sleutel moet slegs bekend wees aan sy gebruiker. 'n Unieke eienskap van die stelsel is dat indien 'n boodskap gekodifiseer is met een sleutel, slegs die ander sleutel van die paar dit sal kan dekodifiseer. Dit maak dit moontlik om outentisiteit, integriteit en non-repudiasie toe te pas. Die tradisionele metodes van betaling soos kontant, tjek en debiet of kredietkaart, gaan mettertyd vervang word deur hul elektroniese eweknie. Die dryfkrag agter die verskynsel is die hoë sekuriteit, doeltreffendheid en spoed waarmee transaksies op die manier gehanteer kan word. Vindingryke betaling metodes is ontdek om die besondere uitdagings van die nuwe ekonomie aan te speek. Byvoorbeeld, knap kaarte kan gebruik word as 'n elektroniese beursie wat elektroniese geld bêre. Ander persoonlike inligting, mediese records, bestuurlisensies, ens. kan ook op die kaart geberg word. Terwyl baie sekuriteits kenners glo dat sekuriteit nie meer 'n stuikelblok is om die Internet vir besigheids transaksies te gebruik nie, bly baie van die verbruikers skepties. Die werkstuk se doel is om daardie onsekerhede uit die weg te ruim, deur te verduidelik hoe sekuriteit toe gepas word, en om te bewys dat die Internet interdaad veilig is as a medium vir besigheids transaksies.
Taylor-King, Darlean. "Parental payment abuse within the Supplemental Security Income program." ScholarWorks, 2008. https://scholarworks.waldenu.edu/dissertations/642.
Повний текст джерелаGarner, Philip David. "Security and fraud analysis for new models in mobile payment." Thesis, Lancaster University, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.441830.
Повний текст джерелаRanda, Jakub. "Systém pro integraci platebních terminálů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-412896.
Повний текст джерелаSifatullah, Bhuiyan Mohammad. "Securing Mobile Payment Protocol based on EMV Standard." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-121512.
Повний текст джерелаChen, Bangdao. "Using human interactive security protocols to secure payments." Thesis, University of Oxford, 2012. http://ora.ox.ac.uk/objects/uuid:f73a0165-410f-4a69-a56c-b6f004253ba3.
Повний текст джерелаMays, Shelley M. "Income Payment Structure and its Influence on Food Security and Fruit Consumption." Digital Archive @ GSU, 2013. http://digitalarchive.gsu.edu/iph_theses/294.
Повний текст джерелаGrundström, Niklas. "A Security Analysis of a Credit Card Payment System for Bitcoin Transactions." Thesis, Linköpings universitet, Programvara och system, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148230.
Повний текст джерелаКниги з теми "Security of payment"
missing], [name. Payment technologies for E-commerce. Berlin: Springer, 2003.
Знайти повний текст джерелаE, Maggs Gregory, ed. Questions & answers: Payment systems. New Providence, NJ: LexisNexis, 2013.
Знайти повний текст джерелаVirtue, Timothy M., ed. Payment Card Industry Data Security Standard Handbook. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781119197218.
Повний текст джерелаPayment card industry data security standard handbook. Hoboken, N.J: John Wiley & Sons, 2009.
Знайти повний текст джерелаVirtue, Timothy M. Payment Card Industry Data Security Standard Handbook. New York: John Wiley & Sons, Ltd., 2008.
Знайти повний текст джерелаMontague, David. Essentials of Online Payment Security and Fraud Prevention. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2010. http://dx.doi.org/10.1002/9781118386750.
Повний текст джерелаMontague, David A. Essentials of online payment security and fraud prevention. New York: Wiley, 2010.
Знайти повний текст джерелаSingapore, ed. Security of payments and construction adjudication: The regime under the Building and Construction Industry Security of Payment Act 2004. Singapore: LexisNexis, 2005.
Знайти повний текст джерелаOrszag, Peter R. Should a lump-sum payment replace social security's delayed retirement credit? Boston, MA: Center for Retirement Research at Boston College, 2001.
Знайти повний текст джерелаSecurity of payments and construction adjudication. Singapore: LexisNexis, 2013.
Знайти повний текст джерелаЧастини книг з теми "Security of payment"
Jourenko, Maxim, Mario Larangeira, and Keisuke Tanaka. "Payment Trees: Low Collateral Payments for Payment Channel Networks." In Financial Cryptography and Data Security, 189–208. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-662-64331-0_10.
Повний текст джерелаLerner, Thomas. "Mobile Technology and Security." In Mobile Payment, 39–60. Wiesbaden: Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-658-03251-7_4.
Повний текст джерелаTéllez, Jesús, and Sherali Zeadally. "Mobile Device Security." In Mobile Payment Systems, 19–33. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-23033-7_2.
Повний текст джерелаRambure, Dominique, and Alec Nacamuli. "Risks in Payment Systems, Oversight and Security." In Payment Systems, 52–68. London: Palgrave Macmillan UK, 2008. http://dx.doi.org/10.1057/9780230227217_4.
Повний текст джерелаBleumer, Gerrit. "Electronic Payment." In Encyclopedia of Cryptography and Security, 387–89. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_198.
Повний текст джерелаSoete, Marijke De. "Payment Card." In Encyclopedia of Cryptography and Security, 918–19. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_296.
Повний текст джерелаTéllez, Jesús, and Sherali Zeadally. "Security in Mobile Payment Systems." In Mobile Payment Systems, 93–106. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-23033-7_4.
Повний текст джерелаZhang, Fangguo, and Yumin Wang. "Security Fundamentals." In Payment Technologies for E-Commerce, 7–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-662-05322-5_2.
Повний текст джерелаMehrnezhad, Maryam, Mohammed Aamir Ali, Feng Hao, and Aad van Moorsel. "NFC Payment Spy: A Privacy Attack on Contactless Payments." In Security Standardisation Research, 92–111. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49100-4_4.
Повний текст джерелаKılınç, Handan, and Serge Vaudenay. "Secure Contactless Payment." In Information Security and Privacy, 579–97. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93638-3_33.
Повний текст джерелаТези доповідей конференцій з теми "Security of payment"
Churaev, I. L., K. B. Dakhkilgova, and Kh G. Chaplaev. "NFC payment security." In I INTERNATIONAL CONFERENCE ASE-I - 2021: APPLIED SCIENCE AND ENGINEERING: ASE-I - 2021. AIP Publishing, 2021. http://dx.doi.org/10.1063/5.0075551.
Повний текст джерелаMartinez-Pelaez, Rafael, Francisco Rico-Novella, and Cristina Satizabal. "Mobile Payment Protocol for Micropayments: Withdrawal and Payment Anonymous." In 2008 New Technologies, Mobility and Security (NTMS). IEEE, 2008. http://dx.doi.org/10.1109/ntms.2008.ecp.61.
Повний текст джерелаVorontsov, S. G. "Security payment: myths and reality." In ТЕНДЕНЦИИ РАЗВИТИЯ НАУКИ И ОБРАЗОВАНИЯ. НИЦ «Л-Журнал», 2018. http://dx.doi.org/10.18411/lj-11-2018-60.
Повний текст джерела"E-PAYMENT SECURITY - Recommendations about the use of a PKI for e-payment security." In 1st International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0001396803170323.
Повний текст джерелаWang, Yong, Christen Hahn, and Kruttika Sutrave. "Mobile payment security, threats, and challenges." In 2016 Second International Conference on Mobile and Secure Services (MobiSecServ). IEEE, 2016. http://dx.doi.org/10.1109/mobisecserv.2016.7440226.
Повний текст джерелаRahaman, Sazzadur, Gang Wang, and Danfeng (Daphne) Yao. "Security Certification in Payment Card Industry." In CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3319535.3363195.
Повний текст джерелаSahut, Jean-Michel. "Security and Adoption of Internet Payment." In 2008 Second International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE). IEEE, 2008. http://dx.doi.org/10.1109/securware.2008.74.
Повний текст джерелаDaiHong, Zhong Runtong, and LanTian. "Risk assessment management for mobile payment security." In 2008 IEEE International Conference on Service Operations and Logistics, and Informatics. IEEE, 2008. http://dx.doi.org/10.1109/soli.2008.4682854.
Повний текст джерелаHuang, Hanyan. "Research on the security of online payment." In 2015 2nd International Conference on Electrical, Computer Engineering and Electronics. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/icecee-15.2015.71.
Повний текст джерелаWang, Zhenqi, Ziyan Guo, and Yue Wang. "Security Research on J2ME-Based Mobile Payment." In 2008 ISECS International Colloquium on Computing, Communication, Control, and Management. IEEE, 2008. http://dx.doi.org/10.1109/cccm.2008.216.
Повний текст джерелаЗвіти організацій з теми "Security of payment"
Marcos Morezuelas, Paloma. Gender, Forests and Climate Change. Inter-American Development Bank, March 2021. http://dx.doi.org/10.18235/0003072.
Повний текст джерелаGross, Tal, Timothy Layton, and Daniel Prinz. The Liquidity Sensitivity of Healthcare Consumption: Evidence from Social Security Payments. Cambridge, MA: National Bureau of Economic Research, October 2020. http://dx.doi.org/10.3386/w27977.
Повний текст джерелаRomer, Christina, and David Romer. Transfer Payments and the Macroeconomy: The Effects of Social Security Benefit Changes, 1952-1991. Cambridge, MA: National Bureau of Economic Research, May 2014. http://dx.doi.org/10.3386/w20087.
Повний текст джерелаLEONOV, T. M., V. M. BOLSHAKOVA, and P. YU NAUMOV. THEORETICAL AND LEGAL ASPECTS OF PROVIDING MEDICAL ASSISTANCE TO EMPLOYEES OF THE MILITARY PROSECUTOR’S OFFICE. Science and Innovation Center Publishing House, 2021. http://dx.doi.org/10.12731/2576-9634-2021-5-4-12.
Повний текст джерелаLambermont, Serge, and Niels De Boer. Unsettled Issues Concerning Automated Driving Services in the Smart City Infrastructure. SAE International, December 2021. http://dx.doi.org/10.4271/epr2021030.
Повний текст джерелаPayment Systems Report - June of 2021. Banco de la República, February 2022. http://dx.doi.org/10.32468/rept-sist-pag.eng.2021.
Повний текст джерелаFinancial Stability Report - First Semester of 2020. Banco de la República de Colombia, March 2021. http://dx.doi.org/10.32468/rept-estab-fin.1sem.eng-2020.
Повний текст джерелаFinancial Stability Report - Second Semester of 2021. Banco de la República, September 2022. http://dx.doi.org/10.32468/rept-estab-fin.sem2.eng-2021.
Повний текст джерелаFinancial Stability Report - Second Semester of 2020. Banco de la República de Colombia, March 2021. http://dx.doi.org/10.32468/rept-estab-fin.sem2.eng-2020.
Повний текст джерела