To see the other types of publications on this topic, follow the link: Secure Payments.

Dissertations / Theses on the topic 'Secure Payments'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 48 dissertations / theses for your research on the topic 'Secure Payments.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Al-Meaither, Mansour. "New schemes for secure electronic payments." Thesis, Royal Holloway, University of London, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.419912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Bangdao. "Using human interactive security protocols to secure payments." Thesis, University of Oxford, 2012. http://ora.ox.ac.uk/objects/uuid:f73a0165-410f-4a69-a56c-b6f004253ba3.

Full text
Abstract:
We investigate using Human Interactive Security Protocols (HISPs) to secure payments. We start our research by conducting extensive investigations into the payment industry. After interacting with different payment companies and banks, we present two case studies: online payment and mobile payment. We show how to adapt HISPs for payments by establishing the reverse authentication method. In order to properly and thoroughly evaluate different payment examples, we establish two attack models which cover the most commonly seen attacks against payments. We then present our own payment solutions wh
APA, Harvard, Vancouver, ISO, and other styles
3

Dold, Florian. "The GNU Taler system : practical and provably secure electronic payments." Thesis, Rennes 1, 2019. http://www.theses.fr/2019REN1S008/document.

Full text
Abstract:
Les nouveaux protocoles de réseautage et cryptographiques peuvent considérablement améliorer les systèmes de paiement électroniques en ligne. Le présent mémoire porte sur la conception, la mise en œuvre et l’analyse sécuritaire du GNU Taler, un système de paiement respectueux de la vie privée conçu pour être pratique pour l’utilisation en ligne comme méthode de (micro-)paiement, et en même temps socialement et moralement responsable. La base technique du GNU Taler peut être dû à l’e-cash de David Chaum. Notre travail va au-delà de l’e-cash de Chaum avec un changement efficace, et la nouvelle n
APA, Harvard, Vancouver, ISO, and other styles
4

Pourghomi, Pardis. "Managing near field communication (NFC) payment applications through cloud computing." Thesis, Brunel University, 2014. http://bura.brunel.ac.uk/handle/2438/8538.

Full text
Abstract:
The Near Field Communication (NFC) technology is a short-range radio communication channel which enables users to exchange data between devices. NFC provides a contactless technology for data transmission between smart phones, Personal Computers (PCs), Personal Digital Assistants (PDAs) and such devices. It enables the mobile phone to act as identification and a credit card for customers. However, the NFC chip can act as a reader as well as a card, and also be used to design symmetric protocols. Having several parties involved in NFC ecosystem and not having a common standard affects the secur
APA, Harvard, Vancouver, ISO, and other styles
5

Budrionis, Andrius. "Elektroninės komercijos saugumas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20110709_152449-66284.

Full text
Abstract:
Darbe nagrinėjami šiuo metu rinkoje naudojami elektroninių atsiskaitymų modeliai ir jų saugumo problemos. Kadangi elektroninių transakcijų metu operuojama svarbiais ir konfidencialiais duomenimis, aukštesnio saugumo lygio užtikrinimo problema visada išlieka itin aktuali. Darbe išnagrinėtos dažniausiai sutinkamos elektroninių atsiskaitymų schemos (tiesioginis atsiskaitymas ir atsiskaitymas per Paypal sistemą), jų saugumo užtikrinimo principai, technikos ir spragos. Atsižvelgiant į dabartinius rinkos poreikius ir informacijos saugumo spragas šiuo metu naudojamuose modeliuose, suprojektuotas aukš
APA, Harvard, Vancouver, ISO, and other styles
6

Pant, Shristi. "A SECURE ONLINE PAYMENT SYSTEM." UKnowledge, 2011. http://uknowledge.uky.edu/cs_etds/1.

Full text
Abstract:
An online payment system allows a customer to make a payment to an online merchant or a service provider. Payment gateways, a channel between customers and payment processors, use various security tools to secure a customer’s payment information, usually debit or credit card information, during an online payment. However, the security provided by a payment gateway cannot completely protect a customer’s payment information when a merchant also has the ability to obtain the payment information in some form. Furthermore, not all merchants provide a secure payment environment to their customers an
APA, Harvard, Vancouver, ISO, and other styles
7

Capper, D. J. S. "Debt enforcement : the struggle to secure payment." Thesis, Queen's University Belfast, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.431478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Deng, Ni. "A secure, payment-based email delivery system." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kovan, Gerry. "SPP Secure Payment Protocol: Protocol Analysis, Implementation and Extensions." Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1079.

Full text
Abstract:
Internet commerce continues to grow rapidly. Over 60% of US households use the internet to shop online. A secure payment protocol is required to support this rapid growth. A new payment protocol was recently invented at IBM. We refer to the protocol as SPP or Secure Payment Protocol. This thesis presents a protocol analysis of SPP. It is essential that a thorough security analysis be done on any new payment protocol so that we can better understand its security properties. We first develop a method for analyzing payment protocols. This method includes a list of desi
APA, Harvard, Vancouver, ISO, and other styles
10

Téllez, Isaac Jesús Augusto. "Design of secure mobile payment protocols for restricted connectivity scenarios." Doctoral thesis, Universitat Politècnica de Catalunya, 2012. http://hdl.handle.net/10803/96918.

Full text
Abstract:
The emergence of mobile and wireless networks made posible the extensión of electronic commerce to a new area of research: mobile commerce called m-commerce, which includes mobile payment), that refers to any e-commerce transaction made from a mobile device using wireless networks. Most of the mobile payment systems found in the literatura are based on the full connectivity scenario where all the entities are directly connected one to another but do not support business models with direct communication restrictions between the entities of the system is not a impediment to perform comercial tra
APA, Harvard, Vancouver, ISO, and other styles
11

Cheong, Chi Po. "Efficient and secure card-based payment system based on ANSI X9.59-2006." Thesis, University of Macau, 2007. http://umaclib3.umac.mo/record=b1684528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Bjurling, Patrik. "Design and Implementation of a Secure In-app Credit Card Payment System." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-112745.

Full text
Abstract:
Smartphones are often used in order to make purchases today and mobile payments are estimated to continue growing in numbers the following years. This makes mobile payment systems attractive to companies as a new business platform. It also increases the number of malicious users trying to exploit the systems for financial gain. This thesis is conducted for the company TaxiCaller which desires to integrate mobile payments into their existing service. It discusses the current security standards for mobile payments and evaluates existing mobile payment solutions. The focus of the evaluation is on
APA, Harvard, Vancouver, ISO, and other styles
13

Tallaros, Andrea Elia. "B-Mule: A Blockchain based Secure Data Delivery Service." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/24899/.

Full text
Abstract:
Trying to modernize rural areas of the globe should be considered an important achievement. Nowadays being able to have an internet connection can prove life-saving. Although technological progress made sure to make the latter accessible to almost anyone, there are places that are hard to reach. The B-Mule project aims to bring messaging services to rural areas that cannot or do not have access to the internet. A data mule that can provide useful and trustworthy services to people inhabiting those areas in order for them to be able to communicate with the outer world without having actual a
APA, Harvard, Vancouver, ISO, and other styles
14

Guler, Sevil. "Secure Bitcoin Wallet." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177587.

Full text
Abstract:
Virtual currencies and mobile banking are technology advancements that are receiving increased attention in the global community because of their accessibility, convenience and speed. However, this popularity comes with growing security concerns, like increasing frequency of identity theft, leading to bigger problems which put user anonymity at risk. One possible solution for these problems is using cryptography to enhance security of Bitcoin or other decentralised digital currency systems and to decrease frequency of attacks on either communication channels or system storage. This report outl
APA, Harvard, Vancouver, ISO, and other styles
15

El, Madhoun Nour. "Towards more secure contact and NFC payment transactions : new security mechanisms and extension for small merchants." Thesis, Sorbonne université, 2018. http://www.theses.fr/2018SORUS168.

Full text
Abstract:
EMV est la norme implémentée pour sécuriser une transaction d'achat avec contact ou sans contact (NFC) entre un appareil de paiement d'un client et un PoS. Elle représente un ensemble de messages de sécurité échangés entre les acteurs de la transaction, garantissant plusieurs propriétés de sécurité importantes. En effet, plusieurs chercheurs ont analysé le fonctionnement de la norme EMV afin de vérifier sa fiabilité: ils ont identifié plusieurs vulnérabilités de sécurité qui représentent aujourd'hui des risques majeurs pour notre sécurité au quotidien. Par conséquent, nous sommes intéressés à
APA, Harvard, Vancouver, ISO, and other styles
16

El, Madhoun Nour. "Towards more secure contact and NFC payment transactions : new security mechanisms and extension for small merchants." Electronic Thesis or Diss., Sorbonne université, 2018. http://www.theses.fr/2018SORUS168.

Full text
Abstract:
EMV est la norme implémentée pour sécuriser une transaction d'achat avec contact ou sans contact (NFC) entre un appareil de paiement d'un client et un PoS. Elle représente un ensemble de messages de sécurité échangés entre les acteurs de la transaction, garantissant plusieurs propriétés de sécurité importantes. En effet, plusieurs chercheurs ont analysé le fonctionnement de la norme EMV afin de vérifier sa fiabilité: ils ont identifié plusieurs vulnérabilités de sécurité qui représentent aujourd'hui des risques majeurs pour notre sécurité au quotidien. Par conséquent, nous sommes intéressés à
APA, Harvard, Vancouver, ISO, and other styles
17

Foo, Ernest. "Strategies for designing efficient electronic payment schemes." Thesis, Queensland University of Technology, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Krob, Jakub. "Platební systémy na Internetu." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-10576.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Usman, Arshad. "The effect of product price and product category on online payment methods and on the decision to own the secure server." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape8/PQDD_0006/MQ43349.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Usman, Arshad Carleton University Dissertation Engineering Systems and Computer. "The Effect of product price and product category on online payment methods and on the decision to own the secure server." Ottawa, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Saparov, Pavel. "Elektronické platební systémy." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-112682.

Full text
Abstract:
The goal of the thesis is to analyze chosen electronic payment systems. The thesis is divided into two parts -- theoretical and practical. Theoretical part is dedicated to cover types of electronic payment system. Also is devoted to the issues of certain legal aspects that are common to all payment systems; defines the necessary concepts and business entities commonly encountered in the payment processing environment. Practical part focuses on the evaluation of usability, safety and usefulness for merchants mainly working with credit cards and particularly with alternative payment system like
APA, Harvard, Vancouver, ISO, and other styles
22

Cahová, Pavlína. "Bankovní klient a jeho ochrana v českém právním systému." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-11115.

Full text
Abstract:
The diploma work is concerned with the topic of bank client security, as a consumer and an investor, captured in the Czech law, incorporating elements of EU directives. The thesis defines terms of "consumer" and "investor", explains why they are considered bank clients and introduces reasons of their protection. It describes elements of bank clients' protection such as: deposit insurance (including comparison of foreign systems - Switzerland and New Zealand), consumer credits rules, payment system and Bureau of Financial Arbiter, personal information security and bank secret. The last chapter
APA, Harvard, Vancouver, ISO, and other styles
23

Zarli, Meiffret Delsanto Kristel. "La fraude en droit de la protection sociale." Thesis, Aix-Marseille, 2016. http://www.theses.fr/2016AIXM1035.

Full text
Abstract:
Le déficit des finances sociales a légitimé le développement d’un arsenal de lutte contre la fraude. La répression pénale traditionnelle, hétérogène et peu mobilisée, s’articule désormais avec une nouvelle répression administrative. Leur complémentarité offre une réponse proportionnée à la gravité des manquements constatés, sans sacrifice des droits des usagers grâce à l’emprise des principes du droit punitif. Les moyens de détection des organismes sont également adaptés pour appréhender la diversité des situations frauduleuses. Les organismes de recouvrement comme les organismes prestataires
APA, Harvard, Vancouver, ISO, and other styles
24

Chapon-Le, Brethon Aurélie. "Le principe d'égalité entre créanciers." Thesis, Normandie, 2019. http://www.theses.fr/2019NORMR088.

Full text
Abstract:
Depuis l'Antiquité, le principe d'égalité entre créanciers apparaît comme le principe fondateur des procédures collectives. Il permet de répartir de manière juste les actifs d'un débiteur impécunieux. Pourtant, l'existence et la portée de la norme sont sans cesse contestées. Les multiples réformes de la matière et ses nouvelles orientations économiques, la place grandissante du droit des sûretés, ainsi que l'internationalisation des procédures, ont contribué a renforcer les controverses autour du traitement égalitaire des créanciers. Les débats relatifs aux manifestations de l'égalité en droit
APA, Harvard, Vancouver, ISO, and other styles
25

Agarwal, Rounak. "A Trusted-Hardware Backed Secure Payments Platform for Android." Thesis, 2021. https://etd.iisc.ac.in/handle/2005/5439.

Full text
Abstract:
Digital payments using personal electronic devices have been steadily gaining in popularity for the last few years. While digital payments using smartphones are very convenient, they are also more susceptible to security vulnerabilities. Unlike devices dedicated to the purpose of payments (e.g. POS terminals), modern smartphones provide a large attack surface due to the presence of so many apps for various use cases and a complex feature-rich smartphone OS. Because it is the most popular smartphone OS by a huge margin, Android is the primary target of attackers. Although the security guarantee
APA, Harvard, Vancouver, ISO, and other styles
26

Chiu, Shin Jung, and 邱信榮. "A Review of Secure Environments for Electronic Payments in Interbet." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/44209598147842251287.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊管理研究所<br>84<br>The purpose of this thesis is to study security issues of electronicpayments over the Internet. In this thesis, the first topic is to compareSSL ( Secure Sockets Layer ) and S-HTTP ( Secure HyperText Transfer Protocol), the two communication security protocols proposed for being implementedin the session layer and in the application layer of TCP/IP, respectively. Then, the next topic is to survey and analyze the security issuesfor current Interent electroni
APA, Harvard, Vancouver, ISO, and other styles
27

Hsu, Ya-Ting, and 許雅婷. "A Secure Mobile Payment Business Model." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/12736094655793330861.

Full text
Abstract:
碩士<br>國立東華大學<br>資訊工程學系<br>101<br>Due to the rapid development of mobile technology and mobile phone applications, consumption patterns have been changing from commerce to E-commerce, and to M-commerce. This represents that the evolution of M-commerce has achieved locations mobility in time. With a smart phone, M-commerce may occur any time, any place. Mobile payments have brought people a more convenient way of payments. In addition to paying by cash, check, or credit cards, customers can now use their mobile devices to pay for a wide range of services. However, customers’ security concerns ar
APA, Harvard, Vancouver, ISO, and other styles
28

Chien, Hsu Ho, and 徐和謙. "Design of Secure Electronic Payment System." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/89804070359588086704.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Liao, Jen-Yi, and 廖仁億. "A Study on Intelligent Secure Electronic Payment Systems." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/80875130318934707743.

Full text
Abstract:
碩士<br>大葉大學<br>資訊管理研究所<br>89<br>At present, electronic payment systems activities constructed on the Internet mainly employ the certificate-based public key cryptosystem to solve their related security issues. But it is based on the condition that the certificate authority (CA) must be honest and need to manage the key directory. Furthermore, it needs to spend extra time to verify the signature signed in the digital certificate by the CA. In practical environments, the CA is not absolutely honest, and it is possible for a hacker to intrude it. Therefore, we have developed efficient s
APA, Harvard, Vancouver, ISO, and other styles
30

Laih, Shun-Wanq, and 賴樹旺. "A Study on the Secure Electronic Payment System." Thesis, 1997. http://ndltd.ncl.edu.tw/handle/06834393271404636573.

Full text
Abstract:
碩士<br>國立台灣工業技術學院<br>電子工程技術研究所<br>85<br>Under the extraordinary growth of international interconnected computer networks, the paperless society is coming true soon. Both cash and checks will be processed in electronic form. Money will be only a lot of electronic data that have been manipulated by the bank. Unfortunately, electronic cash and electronic check systems are under the threats derived from financial crime. In this thesis, some effective methods are proposed for secure electronic pa
APA, Harvard, Vancouver, ISO, and other styles
31

Lin, Wen Te, and 林紋德. "Design of Secure Payment Protocol with NFC Mobile Devices." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/27143238261109358697.

Full text
Abstract:
碩士<br>長庚大學<br>資訊管理學研究所<br>97<br>Due to the development of wireless communication networks in recent years, construction of network environment has become more flexible and the way of using network has also become more mobile. In addition, under government and other related organizations aggressively advertised projects of M-Taiwan and U-Taiwan, wireless communications network has became popular in Taiwan, which brings in unlimited business opportunities of mobile commerce and the development of mobile payment solutions. International and domestic telecommunication and mobile phone providers pr
APA, Harvard, Vancouver, ISO, and other styles
32

Chen, Chiu, and 陳丘. "A Secure and Anonymous Payment Mechanism in Mobile Environment." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/23744642824204790233.

Full text
Abstract:
碩士<br>世新大學<br>資訊管理學研究所(含碩專班)<br>93<br>In the 21 century, the electronic commerce becomes a famous business model. The business model in the cyber environment is popular among consumers today. However, one of the questions which consumer concern about is privacy of the payment system. Business man usually supply the sales promotion and activity of personally sales, but the over amount of the advertisement may cause torment to the consumer. Therefore, the consumers gradually pay much attention to the anonymous transaction. Moreover, with the expectable growth in the mobile commerce, it has a gre
APA, Harvard, Vancouver, ISO, and other styles
33

Zih-Yuan, Meng, and 孟子元. "A Secure Payment Protocol For Mobile Commerce Based On ECC." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/14970021692305413194.

Full text
Abstract:
碩士<br>長庚大學<br>資訊管理研究所<br>92<br>With the popularization of the Internet, Electronic Commerce (E-Commerce) grows vigorously. After that, the network strides forward to wireless, and it promotes the development of Mobile Commerce (M-Commerce). At present, the M-Commerce has already become the newest trend after E-Commerce. More and more services on Internet have been transferred to wireless environment; for instance, on-line floristic shop, inquiry of train schedule and ticket booking, and inquiry of stock quotes, etc. Because M-Commerce is the paradigm shift based on the structure of E-Commerce,
APA, Harvard, Vancouver, ISO, and other styles
34

LIN, WEI-TING, and 林威廷. "Disposable Verification Code Secure Electronic Transaction System for Mobile Payment." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/w8qkv3.

Full text
Abstract:
碩士<br>南臺科技大學<br>資訊管理系<br>106<br>This research is about discussing the current process of secure electronic transactions and improving the transaction model through efficiency and security, which are the features of electronic transactions. In order to increase the payment process efficiency of mobile payment and the securities of traditional electronic transactions, this research proposes a strategy of one-time barcode key certificate system. Based on Android mobile operating system and Eclipse cross platform, this research developed a system of secured payment of mobile transactions. Consumer
APA, Harvard, Vancouver, ISO, and other styles
35

Hung-Yueh, Chen. "A Secure Mobile Electronic Payment Architecture for Heterogeneous Wireless Mobile Networks." 2006. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-0307200623015000.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

HUANG, JIA-WEI, and 黃嘉偉. "A Study of Secure Payment Protocols for NFC-enabled Mobile Phones." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/5dzx9f.

Full text
Abstract:
碩士<br>朝陽科技大學<br>資訊管理系<br>105<br>Although NFC mobile payment is fruitful and useful, security and customer privacy are of great concern to users. For example, attacks like identity impersonation, eavesdropping, and replaying might occur, also personal information and finance conditions could be exposed during payment transactions. Many protocols have been presented to solve these problems by using multiple times of encryptions and digital signatures times for higher security. However, the complicated computations introduce overheads and generate inefficient operations for these protocols. And t
APA, Harvard, Vancouver, ISO, and other styles
37

Chen, Hung-Yueh, and 陳宏岳. "A Secure Mobile Electronic Payment Architecture for Heterogeneous Wireless Mobile Networks." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/44361695397568144060.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊工程學研究所<br>94<br>When the basic functionalities of heterogeneous wireless mobile networks have been in place, network operators are interested in creating value-added mobile applications due to the high demand of electronic trading over the wireless networks or mobile commerce (m-commerce). A good solid secure and robust trading model is needed in order to attract more users (customers) of mobile applications. This paper proposes and implements a secure trading platform named Mobile Electronic Payment (MEP) for heterogeneous wireless mobile networks, which applies the emerging
APA, Harvard, Vancouver, ISO, and other styles
38

Ku, Yen-Chiu, and 古炎秋. "A Transaction-Code and Secure-Mobile-Device Based Electronic Payment Mechanism." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/45261599853810364723.

Full text
Abstract:
碩士<br>國立雲林科技大學<br>資訊管理系碩士班<br>91<br>Following the rapid advancement of electronic commerce, more and more consumers engage themselves in the Internet online transactions. However, even though many elec-tronic payment mechanisms, such as SSL and SET, intended to build a secure payment en-vironment, security is still one vital blocking factor in the widespread acceptance of elec-tronic commerce. Focusing on balancing the tradeoff between security and convenience without the prerequisite that the user must be using a secure computer, a transaction-code and secure-mobile-device based electronic pa
APA, Harvard, Vancouver, ISO, and other styles
39

Yu, Tsung-Che, and 余宗哲. "A Study for Secure Group Mobile Electronic Payment for MBMS Service." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/17516518099125247432.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊網路與多媒體研究所<br>99<br>With the vast development and deployment of wireless mobile networks, more and more users enjoy the mobile applications over the mobile networks. To maintain the QoS, the mobile payment model should supportMBMS and still ensure the transaction security. In this paper, we design a secure multicast-based mobile electronic payment model, named Group Mobile Electronic Payment (GMEP). GMEP inherits the advantages of micropayment and guarantees the requirements of multicast secrecy.
APA, Harvard, Vancouver, ISO, and other styles
40

Lee, Chia-En, and 李嘉恩. "A Secure and Convenient Mobile Credit Payment Scheme Using Public Personal Information." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/289be9.

Full text
Abstract:
碩士<br>逢甲大學<br>資訊工程所<br>91<br>There is no denying that the Internet starts to permeate and grow on society at a rapid pace. It becomes another important part of people’s lives beside the telephone and television. One significant feature of the Internet is that it is a worldwide service. Enterprises or merchants can sell their products or contents online and potentially attract many consumers around the world. Consumers use the Internet to shop, make an order for goods and pay for what they bought. The solutions for E-Commerce proceeding are called E-payment schemes such as SET, SSL, e-Cash
APA, Harvard, Vancouver, ISO, and other styles
41

Shi-Ming, Vincent, and 黃士銘. "Provably Secure Privacy Mechanism for Authentication, Billing and Payment in Mobile Communications." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/34762147882564692715.

Full text
Abstract:
博士<br>國立中山大學<br>資訊工程學系研究所<br>98<br>Mobile communication is very mature today due to the powerful computation and communication capabilities of mobile devices, the flourishing of mobile networks, the popularity of electronic commerce, and the completeness of e-payment mechanisms. It is a pleasure for mobile users to roam around the mobile networks and enjoy the mobile network services. However, there are a lot of security threats in the mobile networks, and thus we need an anonymous mutual authentication and key exchange scheme to guarantee the security and privacy for mobile users in the netwo
APA, Harvard, Vancouver, ISO, and other styles
42

Lai, Ya-yun, and 賴亞筠. "A Study of Secured Transaction on Third Party Payment Model." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/q9zbjd.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>財務金融研究所<br>100<br>The rapidly growing popularity of network applications, internet consumers, online shopping, and online auctions have fueled to change people&apos;s consumption habits. However, internet shopping still possesses high risk level in security compare to physical shopping. Websites of various sizes, hacker attacks, the theft of a capital, and the overall network security environment are of everyone&apos;s concern, especially given the cases of Internet shopping fraud event and transaction disputes heard. In this study, third party profile analysis and case study
APA, Harvard, Vancouver, ISO, and other styles
43

Lau, Chi-Kin, and 劉子健. "NSEP: A Novel Secure Micro Electronic Payment Model for the Next Generation Wireless Networks." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/60308405932902846912.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊網路與多媒體研究所<br>101<br>In the next generation wireless networks, heterogeneous network technologies (e.g., UMTS, LTE, WiMAX, and WiFi) coexist to provide users communications services. Users may use different terminals to access different Internet applications through different communication services simultaneously. The applications and communication services are owned by different operators. Users obtain the services/applications by making payments to their subscribed networks. Prepaid is one of the payment models, which ensures that users do not overuse the communication servi
APA, Harvard, Vancouver, ISO, and other styles
44

Chun-Yung, Chien, and 簡俊永. "A STUDY ON DELAY PAYMENT FORCAST MODEL OF REAL ESTATE SECURED LOAN." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/22066779844125344378.

Full text
Abstract:
碩士<br>國立高雄應用科技大學<br>商務經營研究所<br>94<br>This paper real estate secured loan one from A.D. 2000 to 2003 of specialized bank of guaranteed loan of house as the target , the situation divides the family in breach into the normal family and exceeds the time limit to stop the paying of the debtor, and with the sex, age, marital status, academic credentials, mode of repayment, the rates of total debt and annual income, room age , area of the house , security position, grant the loan to count , whether the special project grants the loan, while granting the loan, interest rate, amount of money of the lo
APA, Harvard, Vancouver, ISO, and other styles
45

Lee, Chi-Hao, and 李志豪. "A Factoring and Discrete Logarithm Based Fair Blind Signature and Its Application on the Design of a Secure Electronic Payment System." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/8auz2v.

Full text
Abstract:
碩士<br>逢甲大學<br>電子工程所<br>90<br>The security of most previously suggested public-key cryptographic systems is based upon a single computationally hard problem, such as the factoring problem or the discrete logarithm problem etc. however, they will no longer be secure if the corresponding hard problem is solved in the future. A significant solution to the problem is to develop cryptographic systems whose securities are based on solving several different hard problems simultaneously. In 1998, Shao proposed two signature schemes and claimed that their securities are based on both the factoring probl
APA, Harvard, Vancouver, ISO, and other styles
46

Κέντρος, Σωτήριος. "Ανοιχτή πλατφόρμα για την ασφαλή ανταλλαγή πληροφορίας σε περιβάλλον κινητών επικοινωνιών". Thesis, 2008. http://nemertes.lis.upatras.gr/jspui/handle/10889/1497.

Full text
Abstract:
Στόχος της παρούσας διπλωματικής εργασίας είναι ο σχεδιασμός ενός συστήματος ασφαλούς μεταφοράς δεδομένων από κινητές τερματικές συσκευές όπως κινητά τηλέφωνα και PDAs (Personal Digital Assistants). Ένα τέτοιο σύστημα θα μπορούσε να χρησιμοποιηθεί για τη μετάδοση ευαίσθητων προσωπικών δεδομένων, όπως βιοϊατρικά δεδομένα που συλλέγονται από βιοαισθητήρες, ή για τη διενέργεια ηλεκτρονικών πληρωμών. Στην παρούσα εργασία κάνουμε μία σύνοψη των τελευταίων τεχνολογιών στην κινητή τηλεφωνία, τα πρωτόκολλα επικοινωνίας για διαδικτύωση σε περιβάλλον κινητών επικοινωνιών, καθώς και βασικών κρυπτο
APA, Harvard, Vancouver, ISO, and other styles
47

Martins, João Pedro Vargas Carinhas de Oliveira. "Os suprimentos no financiamento societário: uma abordagem funcionalista." Master's thesis, 2010. http://hdl.handle.net/10071/6365.

Full text
Abstract:
As sociedades comerciais de responsabilidade limitada formam como que a espinha dorsal das modernas economias de mercado, atento o facto de a maioria da actividade económica passar por elas. Isto não acontece por acidente. Com efeito, as referidas sociedades possuem características específicas que as tornam particularmente aptas para serem utilizadas como veículos de investimento e produção de bens e serviços para o mercado. No entanto, são essas mesmas características que, por outro lado, potenciam a verificação de comportamentos oportunistas por parte dos sócios e/ou gestores em relação à so
APA, Harvard, Vancouver, ISO, and other styles
48

Meng, Maurice. "L'affaire Marché central : description et analyse d'une fraude immobilière de grande envergure." Thèse, 2007. http://hdl.handle.net/1866/7398.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!