providing security for e-wallet using e-cheque

نویسندگان

b. yahid it department university of guilan, rasht, iran

dr. a. shahbahrami postdoctoral in computer engineering department, university of guilan,rasht, iran

dr. m. b. nobakht postdoctoral in management and economy department ministry of science, research and technology, tehran, iran

چکیده

payment is one of the main parts in businesses. different types of software, hardware and methods for paying electronically have been presented. different types of banking cards, e-wallet, internet web pages for payment make it possible to pay both online and offline. however, in most payment tools, exchanging money is anonymously and untraceably. therefore, although most security techniques within payment tools are considered to restrict abuse, if it is stolen, it makes possible to be abuse. furthermore, anonymous characteristics of e-money make it possible for money laundering. e-cheque includes both sides name in a business, and also it is traceable. by using e-cheque techniques in payment tools instead of e-money, it is possible to increase payment tools security.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Electronic Commerce and E-wallet

In electronic commerce, the challenges of payment transactions were initially underestimated. Business via the internet and mobile telephony has so far been dominated by the methods of payment systems in traditional business. However, in light of advances in e-commerce, traditional business models are increasingly coming up against their limits. To understand the concept of electronic commerce,...

متن کامل

Trust in E-Cheque in Electronic Payments

Today, e-commerce has considerable portion in commercial businesses, and it has been developing. One of the most important steps in e-commerce is e-payment that has been done through different tools such as e-banking, and e-cheques. In this type of electronic transactions, there are always different worries both for payers and payees due to untruthfulness. For example, amount modifying, date mo...

متن کامل

A Holistic Approach for Providing Security Solutions in e-Government

E-Government is now in a stage where effective and secure online transaction services have to be provided. Yet, initial security are primarily technical. Many technical concepts and tools have been developed in the scope of e-Commerce. Applying these to the scope of eGovernment need careful investigations. Security aspects do not, however, concern technical aspects only. The particular security...

متن کامل

E-wallet Software Architecture with Decentralized Credentials

This paper reports on results from a Master thesis project undertaken to develop software architecture for decentralized credentials, a generalization of the concept of an electronic wallet system developed in the European research project CAFÉ [1]. Within this new model you can leave most of the content of your electronic wallet (credentials, keys and passwords) at the security of your residen...

متن کامل

Parasitic Authentication To Protect Your E-Wallet

T he electronic wallet (e-wallet) has received much attention lately. It promises to consolidate many of the personal items carried around by the modern individual: wallet, phone, pager, diary, and keys. In fact, Nokia's 9001 Communicator already combines the phone, pager, and diary into one unit. The question arises, however, of how to provide user authentication. Traditional protection mechan...

متن کامل

M-Wallet Security using Cued Click Points

The main goal of this paper is to provide higher level of security by using graphical password authentication scheme. Text passwords are easily broken by various intruders and may hack all confidential information of user. User often create memorable passwords that are easy for attackers to guess, but strong system –assigned passwords are difficult for user to remember. So we are making use of ...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
international journal of information science and management

جلد ۲۰۱۳، شماره ۰۴، صفحات ۸۵-۹۶

کلمات کلیدی

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023