Properties of Payment Systems: General Definition Sketch and Classification (original) (raw)

Free PDF

SEMPER - Secure Electronic Marketplace for Europe Cover Page

Free PDF

Strong loss tolerance of electronic coin systems Cover Page

TRANSFERRING SECRET ELECTRONIC PAYMENT

Transferring an E-payment scheme on NETWORK is described. It can work on personal computers or smart phones. This particular property is useful to suppress double spending. Nevertheless it has benefits that are expected from electronic money such as anonymity. This money scheme can be used in both, online and offline mode. In online mode, double spending is strictly avoided. In offline mode, double spending is easily detected, if attempted. In particular we have given implementation of this scheme for personal computer and may be mobile phone devices. These devices have a lot of memory and processing power constraints. A payment scheme should work reasonably efficient on these devices. These devices provide a number of choices for wireless connectivity also.

Free PDF

TRANSFERRING SECRET ELECTRONIC PAYMENT Cover Page

Free PDF

How to Break Another “Provably Secure” Payment System Cover Page

Free PDF

Design, implementation, and deployment of the iKP secure electronic payment system Cover Page

Free PDF

Control of Information Distribution and Access Cover Page

Free PDF

The ESPRIT project CAFE —High security digital payment systems Cover Page

Free PDF

Asymmetric fingerprinting for larger collusions Cover Page

Free PDF

MiniPay: charging per click on the Web Cover Page

Trustworthy User Devices

There are numerous plans to supply users with personal devices to improve security in areas such as electronic commerce, payment systems, and digital signatures. Most of these plans take only smartcards into consideration. However, there is a rapidly growing market for far more powerful mobile user devices, for example, mobile phones, pagers, gameboys, multifunctional watches, personal communicators, and personal digital assistants (PDAs). Most mobile user devices inherently require security functions for some of their prospective applications. To a great extent these two separate developments can be expected to merge over the next few years. This opens up new architectural options for security, but also poses new threats. This article surveys the resulting design issues. Although no device can be completely trustworthy, the authors believe that combining security functions and powerful mobile user devices can produce mutual benefits if appropriate measures are taken. 1 .2 Introduct...

Free PDF

Trustworthy User Devices Cover Page