Properties of Payment Systems: General Definition Sketch and Classification (original) (raw)
Free related PDFsRelated papers
Free PDF
Free PDF
TRANSFERRING SECRET ELECTRONIC PAYMENT
Transferring an E-payment scheme on NETWORK is described. It can work on personal computers or smart phones. This particular property is useful to suppress double spending. Nevertheless it has benefits that are expected from electronic money such as anonymity. This money scheme can be used in both, online and offline mode. In online mode, double spending is strictly avoided. In offline mode, double spending is easily detected, if attempted. In particular we have given implementation of this scheme for personal computer and may be mobile phone devices. These devices have a lot of memory and processing power constraints. A payment scheme should work reasonably efficient on these devices. These devices provide a number of choices for wireless connectivity also.
Free PDF
Free PDF
Free PDF
Free PDF
Free PDF
Free PDF
Free PDF
There are numerous plans to supply users with personal devices to improve security in areas such as electronic commerce, payment systems, and digital signatures. Most of these plans take only smartcards into consideration. However, there is a rapidly growing market for far more powerful mobile user devices, for example, mobile phones, pagers, gameboys, multifunctional watches, personal communicators, and personal digital assistants (PDAs). Most mobile user devices inherently require security functions for some of their prospective applications. To a great extent these two separate developments can be expected to merge over the next few years. This opens up new architectural options for security, but also poses new threats. This article surveys the resulting design issues. Although no device can be completely trustworthy, the authors believe that combining security functions and powerful mobile user devices can produce mutual benefits if appropriate measures are taken. 1 .2 Introduct...
Free PDF