Academic literature on the topic 'Credit security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Credit security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Credit security"
Yang, Ming-Hour. "Security Enhanced EMV-Based Mobile Payment Protocol." Scientific World Journal 2014 (2014): 1–19. http://dx.doi.org/10.1155/2014/864571.
Full textRowlingson, R. "Credit crunch, security crunch." ITNOW 51, no. 1 (2009): 32. http://dx.doi.org/10.1093/itnow/bwp020.
Full textJacob, Otu Enyia, and Usang Okon Emmanuel. "Classification of Credit Security in Nigeria: Resolving the Perceived Dichotomy." Journal of Economics and Business 1, no. 2 (2018): 190–97. https://doi.org/10.31014/aior.1992.01.02.18.
Full textOsabohien, Romanus, Adesola Afolabi, and Abigail Godwin. "An Econometric Analysis of Food Security and Agricultural Credit Facilities in Nigeria." Open Agriculture Journal 12, no. 1 (2018): 227–39. http://dx.doi.org/10.2174/1874331501812010227.
Full textLi, Zhaojun, Ming Zhu, and Ning Zhang. "Research on Dynamic Evaluation of Metro Passenger Credit." E3S Web of Conferences 372 (2023): 02016. http://dx.doi.org/10.1051/e3sconf/202337202016.
Full textSaha, Mainak, M. Trinath Basu, Arpita Gupta, et al. "Enhancing credit card security using RSA encryption and tokenization: a multi-module approach." International Journal of Informatics and Communication Technology (IJ-ICT) 14, no. 1 (2025): 132. https://doi.org/10.11591/ijict.v14i1.pp132-140.
Full textMainak, Saha, Trinath Basu M., Gupta Arpita, et al. "Enhancing credit card security using RSA encryption and tokenization: a multi-module approach." International Journal of Informatics and Communication Technology 14, no. 1 (2025): 132–40. https://doi.org/10.11591/ijict.v14i1.pp132-140.
Full textFadeikina, N. V., and V. S. Zyryanov. "Information and economic security of a credit institution as factors of ensuring its sustainable development." Siberian Financial School, no. 2 (August 26, 2024): 50–60. http://dx.doi.org/10.34020/1993-4386-2024-2-50-60.
Full textDr. S. Gandhimathi and Ms. J. Soundarya. "Credit Card Transaction Security Using Facial Recognition Technology." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 2358–65. https://doi.org/10.32628/cseit23112573.
Full textKhan, Aliza. "INDIVIDUAL'S BEHAVIOR AND PERCEPTION TOWARDS CREDIT CARD ADOPTION." Journal for Business Education and Management 3, no. 1 (2023): 23–40. https://doi.org/10.56596/jbem.v3i1.90.
Full textDissertations / Theses on the topic "Credit security"
Boy, Nina. "The security of public credit." Thesis, Lancaster University, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.663217.
Full textDahabiyeh, Laila Ali. "IS security networks in credit card fraud prevention." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/88609/.
Full textSofola, Olatokunbo. "The Nigerian law of consumer credit and security." Thesis, King's College London (University of London), 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268316.
Full textFrey, Rüdiger, Lars Rösler, and Dan Lu. "Corporate Security Prices in Structural Credit Risk Models with Incomplete Information." Wiley, 2017. http://dx.doi.org/10.1111/mafi.12176.
Full textKalkan, Kutay. "A critical look at payment card industry data security standards implementation in restaurants." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 110 p, 2009. http://proquest.umi.com/pqdweb?did=1885544321&sid=4&Fmt=2&clientId=8331&RQT=309&VName=PQD.
Full textGrundström, Niklas. "A Security Analysis of a Credit Card Payment System for Bitcoin Transactions." Thesis, Linköpings universitet, Programvara och system, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148230.
Full textShariff, Mohd Noor Mohd. "An evaluation of government-backed loan scheme in Malaysia." Thesis, Loughborough University, 2000. https://dspace.lboro.ac.uk/2134/7183.
Full textDavies, Iwan Rhun. "Aspects of title financing in personality with reference to the reform of English personal property security law." Thesis, Cardiff University, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.254674.
Full textWells, William Ward. "Information security program development." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.
Full textBerg, Claudia N. "Impact of Microfinance on Food Security, Informal Credit, and Agricultural Wages| The Case of Bangladesh." Thesis, The George Washington University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3609079.
Full textBooks on the topic "Credit security"
Duggan, A. J. Regulated credit: The credit and security aspects. Law Book Co., 1989.
Find full textRodriguez, Rufus Bautista. Credit transactions. 2nd ed. Central Lawbook Pub., 1992.
Find full textGoode, Royston Miles. Legal problems of credit and security. 3rd ed. Sweet & Maxwell, 2003.
Find full textMartin, Evans. Giving credit where it's due?: The success of Family Credit reassessed. Welfare State Programme, Suntory and Toyota International Centres for Economics and Related Disciplines, 1996.
Find full textNational Association of Federal Credit Unions. NAFCU's information security audit for credit unions. Sheshunoff, 2008.
Find full textOmotola, J. A. The law of secured credit. Evans Brothers (Nig. Publishers) Ltd., 2006.
Find full textBook chapters on the topic "Credit security"
East, Robert. "Working Families Tax Credit and Disabled Person’s Tax Credit." In Social Security Law. Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-14610-9_9.
Full textSoni, Arun. "Debit/Credit Card Security." In The Cybersecurity Self-Help Guide. CRC Press, 2021. http://dx.doi.org/10.1201/9781003148678-10.
Full textChow, Sherman S. M., Russell W. F. Lai, Xiuhua Wang, and Yongjun Zhao. "Privacy Preserving Credit Systems." In Network and System Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46298-1_13.
Full textMolloy, Ian, Jiangtao Li, and Ninghui Li. "Dynamic Virtual Credit Card Numbers." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77366-5_19.
Full textWang, Jilin, Yingzi Chen, and Xiaoqing Feng. "Privacy-Preserving Credit Scoring on Cloud." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00012-7_18.
Full textClose, Tyler. "Credit Transfer for Market-Based Infrastructure." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11889663_13.
Full textAndroulaki, Elli, and Steven Bellovin. "An Anonymous Credit Card System." In Trust, Privacy and Security in Digital Business. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03748-1_5.
Full textSalcic, Zlatko. "Security for Payment of Credits Covered by ECAs." In Export Credit Insurance and Guarantees. Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1057/9781137366818_17.
Full textKundu, Amlan, Shamik Sural, and A. K. Majumdar. "Two-Stage Credit Card Fraud Detection Using Sequence Alignment." In Information Systems Security. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11961635_18.
Full textVatsa, Vishal, Shamik Sural, and A. K. Majumdar. "A Game-Theoretic Approach to Credit Card Fraud Detection." In Information Systems Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11593980_20.
Full textConference papers on the topic "Credit security"
Satapathy, Swetashree, Madhusri Padhy, Shubhasmita Nayak, Priyanshu Patra, Prasant Kumar Dash, and Priti Priyadarsani Pradhan. "Credit Card Security Enhancement Through Integrated Machine Learning Techniques." In 2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS). IEEE, 2024. http://dx.doi.org/10.1109/iciteics61368.2024.10624859.
Full textB S, Darshan, Vishal Kumar I B, Ashwini Kodipalli, and Trupti Rao. "Default credit card scoring using ML." In 2024 International Conference on Computational Intelligence for Security, Communication and Sustainable Development (CISCSD). IEEE, 2024. https://doi.org/10.1109/ciscsd63381.2024.00022.
Full textChaurasia, Sarthak, Ritik Sharma, Shubhang Tripathi, Tanya Gupta, and Bharat Bhardwaj. "Credit Card Fraud Detection Using Machine Learning." In 2025 3rd International Conference on Communication, Security, and Artificial Intelligence (ICCSAI). IEEE, 2025. https://doi.org/10.1109/iccsai64074.2025.11063781.
Full textMahure, Sonali Jagdish, and Vennala M. Reddy. "Enhancing Credit Card Security: Exploiting Machine Learning for Fraud Detection." In 2024 Second International Conference on Inventive Computing and Informatics (ICICI). IEEE, 2024. http://dx.doi.org/10.1109/icici62254.2024.00038.
Full textAggarwal, Ananya, and Kanwarpartap Singh Gill. "AI-Enhanced Security: The Future of Credit Card Fraud Detection." In 2024 International Conference on Intelligent Computing and Sustainable Innovations in Technology (IC-SIT). IEEE, 2024. https://doi.org/10.1109/ic-sit63503.2024.10862885.
Full textGuan, Guilin, Ting Zhi, Cai Yu, Yang Cao, Houze Dong, and Wei Zhou. "Security and Credit evaluation mechanism federated learning privacy protection scheme." In 2025 IEEE 17th International Conference on Computer Research and Development (ICCRD). IEEE, 2025. https://doi.org/10.1109/iccrd64588.2025.10963257.
Full textD'souza, Kyle, Sia Puthusseri, and Aiden Gigi Samuel. "Scalable Federated Learning for Privacy-Preserving Credit Card Fraud Detection." In 2023 IEEE International Carnahan Conference on Security Technology (ICCST). IEEE, 2023. http://dx.doi.org/10.1109/iccst59048.2023.10726848.
Full textPatil, Chaitali, Kushal Birla, Pushkar Sunilkumar Nikumb, and Hitesh Kailash Patil. "Blockchain Powered Carbon Credit Trading System using CAP-and-Trade Mechanism." In 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS). IEEE, 2024. https://doi.org/10.1109/icbds61829.2024.10837557.
Full textAggarwal, Ananya, Kanwarpartap Singh Gill, Deepak Upadhyay, and Sarishma Dangi. "Fortifying Financial Security: The Power of Machine Learning in Credit Card Fraud Detection." In 2024 3rd International Conference for Advancement in Technology (ICONAT). IEEE, 2024. https://doi.org/10.1109/iconat61936.2024.10774612.
Full textBtoush, Eyad, Xujuan Zhou, Raj Gururajan, KC Chan, and Omar Alsodi. "Optimising Security: A Hybrid CNN-BiLSTM Model for Credit Card Cyber Fraud Detection." In 2024 Twelfth International Conference on Advanced Cloud and Big Data (CBD). IEEE, 2024. https://doi.org/10.1109/cbd65573.2024.00074.
Full textReports on the topic "Credit security"
Boyarchenko, Nina, and Leonardo Elias. Corporate Debt Structure over the Global Credit Cycle. Federal Reserve Bank of New York, 2024. https://doi.org/10.59576/sr.1139.
Full textSmith, Tom W. Security Awareness and the Climate of Public Opinion: With Special Attention to Financial and Credit Issues,. Defense Technical Information Center, 1991. http://dx.doi.org/10.21236/ada262047.
Full textRivadeneira, Alex, Carlo Alcaraz, Nicolás Amoroso, Rodolfo Oviedo, Brenda Samaniego, and Horacio Sapriza. The Real Effects of Credit Supply Shocks During the COVID-19 Pandemic. Banco de México, 2024. https://doi.org/10.36095/banxico/di.2024.16.
Full textSchling, Maja, Nicolás Pazos, Leonardo Corral, and Marisol Inurritegui. The Effects of Tenure Security on Women's Empowerment and Food Security: Evidence From a Land Regularization Program in Ecuador. Inter-American Development Bank, 2023. http://dx.doi.org/10.18235/0005355.
Full textKim, Jae-Jin, Hyoeun Kim, Sewon Kim, and Gerardo Reyes-Tagle. A Roadmap for Digitalization of Tax Systems: Lessons from Korea. Inter-American Development Bank, 2022. http://dx.doi.org/10.18235/0004195.
Full textRivera, Mildred, Romina Nicaretta, Estefhania Moncada, et al. Innovation in the Caribbean: Six Stories of Transformation for Sustainable Development. Inter-American Development Bank, 2024. http://dx.doi.org/10.18235/0013029.
Full textSchling, Maja, Magaly Saenz Somarriba, and Juan de Dios Mattos. Land Regularization and Technical Efficiency in Agricultural Production: An Empirical Study in Andean Countries. Inter-American Development Bank, 2024. http://dx.doi.org/10.18235/0012945.
Full textMurshid, K. A. S. Food Security in an Asian Transitional Economy: The Cambodian Experience. Cambodia Development Resource Institute, 1998. https://doi.org/10.64202/wp.06.199812.
Full textYim, Chea, and Bruce McKenney. Domestic Fish Trade: A Case Study of Fish Marketing from the Great Lake of Phnom Penh. Cambodia Development Resource Institute, 2003. https://doi.org/10.64202/wp.29.200311.
Full textVera-Cossio, Diego A., Bridget Hoffmann, Camilo Pecha, et al. Re-thinking Social Protection: From Poverty Alleviation to Building Resilience in Middle-Income Households. Inter-American Development Bank, 2023. http://dx.doi.org/10.18235/0004969.
Full text