نتایج جستجو برای: debit transaction

تعداد نتایج: 26193  

2010
Zhu Wang

Debit cards have become an indispensable part of the U.S. payments system, accounting for more than a third of consumer payments at point of sale. With this development has come controversy: Card networks charge merchants fees that merchants believe are too high. And most of the fees are ad valorem—that is, based on transaction value—rather than fixed fees per transaction. Merchants are critica...

2016
Roy Laurens Cliff Changchun Zou

This paper presents a novel method of using Dynamic Soft Descriptor as a fraud prevention method for Merchant (as opposed to card Issuer) in a credit/debit card transaction under Card Not Present (CNP) environment, such as online transactions. A unique identifier is embedded into the transaction descriptor, which will instantly appear in the cardholder’s credit/debit card online statement. By c...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1387

چکیده ندارد.

1995
G. Gemünd M. Jakob Werner Massonne Wolfgang J. Paul B. Spengler

The SB{PRAM is a shared memory parallel machine under construction in Saarbr ucken. With the help of simulations we have evaluated the performance of transaction systems on this machine. We use the well known DEBIT/CREDIT benchmark as workload. According to the simulations the machine reaches 6000 transactions per second with 256 data disks, 32 log disks and 128 processors, although each proces...

2013
Max Günther Bernd Borchert

Banks want to use their genuine strong credential for online banking transaction authorization the debit card. Customers nowadays are usually equipped with a Smartphone and prefer to not carry a card reader in addition. Methods where developed that use the Smartphone to authorize online banking transactions. These methods are vulnerable to Smartphone malware. We present NFC-TAN as a Smartphone ...

2015
Amit Kumar Kailash Patidar Manoj Kumar Yadav

-Now a day, e-commerce sites are very popular. Online shopping using wap enabled mobile phone has widely come into use. Debit and credit cards are used for secure etransaction. As the technology developed thief are also very smart, they stolen our detail from wap and use it. we present a model that can be used for secure transaction during using smart phone and give the features of smart phone ...

2007
Grigori Goldman

In this paper we shall introduce a new electronic payment concept based on the popular direct debit payment model, entitled periodical payments. The direct debit model currently in use online is neither secure nor flexible, and requires a leap of faith by the customer who must trust the merchant to behave honestly. Electronic direct debit request (DDR) forms are not signed by both parties in a ...

2005
Gisle Grimen Jeanine Lilleng Jon Olav Hauglid

This thesis presents a framework of a passively replicated transaction manager. By integrating transactions and replication, two well known fault tolerance techniques, the framework provides high availability for transactional systems and better support for non-deterministic execution for replicated systems. A prototype Java implementation of the framework, based on Jgroup/ARM and Jini, has bee...

1998
Michel Dawirs Joan Daemen

This document describes a new cryptographic protocol that allows the efficient authentication of an unlimited amount of data coming from an IC Card by an off-line terminal where the IC Card’s cryptographic capability is limited to computing one-way functions and MACs. The authentication of the IC Card and its data are based on a Challenge-Response protocol using one-way functions. The protocol ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید