• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 63
  • 6
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 84
  • 84
  • 84
  • 36
  • 25
  • 24
  • 22
  • 17
  • 17
  • 16
  • 14
  • 13
  • 12
  • 12
  • 11
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Issues in electronic payment systems: a new off-line transferable e-coin scheme and a new off-line e-check scheme.

January 2001 (has links)
by Wong Ha Yin. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2001. / Includes bibliographical references (leaves 71-74). / Abstracts in English and Chinese. / Chapter Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Traditional Payment Systems --- p.1 / Chapter 1.2 --- Electronic Payment System --- p.2 / Chapter 1.3 --- Thesis Organization --- p.4 / Chapter Chapter 2 --- Cryptographic Techniques --- p.5 / Chapter 2.1 --- Encryption and Decryption --- p.5 / Chapter 2.1.1 --- Symmetric Encryption --- p.6 / Chapter 2.1.2 --- Asymmetric or Public-Key Encryption --- p.6 / Chapter 2.2 --- RSA --- p.7 / Chapter 2.3 --- Blind Signatures --- p.8 / Chapter 2.4 --- General Computation Protocols --- p.8 / Chapter 2.5 --- Cut-and-Choose Method --- p.9 / Chapter 2.6 --- Hash Functions --- p.9 / Chapter 2.7 --- Secret Sharing --- p.10 / Chapter 2.8 --- Zero-Knowledge Proofs --- p.11 / Chapter 2.9 --- Timestamps --- p.12 / Chapter Chapter 3 --- Overview of Electronic Payment Systems --- p.13 / Chapter 3.1 --- Life Cycle --- p.13 / Chapter 3.2 --- Six Basic Requirements --- p.15 / Chapter 3.3 --- Efficiency --- p.16 / Chapter 3.4 --- History --- p.17 / Chapter Chapter 4 --- Ferguson's Single-term Off-Line Coins --- p.19 / Chapter 4.1 --- Basic Assumption and Tools --- p.19 / Chapter 4.1.1 --- Secure Hash Function --- p.19 / Chapter 4.1.2 --- Polynomial Secret Sharing Scheme --- p.20 / Chapter 4.1.3 --- Randomized Blind Signature --- p.21 / Chapter 4.2 --- The Basic Signal-term Cash System --- p.23 / Chapter 4.2.1 --- The Withdrawal Protocol --- p.24 / Chapter 4.2.2 --- The Payment Protocol --- p.26 / Chapter 4.2.3 --- The Deposit Protocol --- p.27 / Chapter Chapter 5 --- Cash with Different Denominations --- p.28 / Chapter 5.1 --- Denomination Bundling --- p.28 / Chapter 5.2 --- Coin Storage --- p.29 / Chapter Chapter 6 --- An Off-Line Transferable E-coin System --- p.32 / Chapter 6.1 --- Introduction --- p.32 / Chapter 6.2 --- The Withdrawal Protocol --- p.34 / Chapter 6.3 --- The Transfer / Payment Protocol --- p.36 / Chapter 6.4 --- The Deposit Protocol --- p.40 / Chapter 6.5 --- Expansion of Coins --- p.42 / Chapter 6.6 --- Security and privacy Analysis --- p.43 / Chapter 6.7 --- Complexity Analysis --- p.47 / Chapter 6.8 --- Conclusion --- p.49 / Chapter Chapter 7 --- A New Off-line E-check System --- p.50 / Chapter 7.1 --- Introduction --- p.50 / Chapter 7.2 --- E-checks Models --- p.51 / Chapter 7.3 --- E-Check System with Partial Privacy --- p.52 / Chapter 7.3.1 --- The Withdrawal Protocol --- p.52 / Chapter 7.3.2 --- The Payment Protocol --- p.55 / Chapter 7.3.3 --- The Deposit Protocol --- p.56 / Chapter 7.3.4 --- The Refund Protocol --- p.57 / Chapter 7.3.5 --- Protocol Discussion --- p.58 / Chapter 7.4 --- E-Check System with Unconditional Privacy --- p.59 / Chapter 7.4.1 --- The Withdrawal Protocol --- p.59 / Chapter 7.4.2 --- The Payment Protocol --- p.63 / Chapter 7.4.3 --- The Deposit Protocol --- p.64 / Chapter 7.4.4 --- The Refund Protocol --- p.65 / Chapter 7.4.5 --- Protocol Discussion --- p.67 / Chapter 7.5 --- Conclusion --- p.68 / Chapter Chapter 8 --- Conclusion --- p.69 / Reference --- p.71
12

A feasibility study : should a major New York commercial bank offer telephone bill payment

Edmunds, Dale Craig, Fishman, Barbara Dalton, Hedstrom, Mitchell Warren January 1977 (has links)
Thesis. 1977. M.S.--Massachusetts Institute of Technology. Alfred P. Sloan School of Management. / MICROFICHE COPY AVAILABLE IN ARCHIVES AND DEWEY. / Bibliography : leaves 170-174. / by Dale Craig Edmunds and Barbara Dalton Fishman and Mitchell Warren Hedstrom. / M.S.
13

A decision framework for consmer-oriented electronic funds transfer systems

Carrión, Richard Louis, Smith, Robert Alan January 1977 (has links)
Thesis. 1977. M.S.--Massachusetts Institute of Technology. Alfred P. Sloan School of Management. / MICROFICHE COPY AVAILABLE IN ARCHIVES AND DEWEY. / Bibliography : leaves 63-67. / by Richard Louis Carrioń and Robert Alan Smith. / M.S.
14

Electronic funds transfers survey of users and nonusers /

Albert, Suzan. January 1978 (has links)
Thesis (M.S.)--Wisconsin. / Includes bibliographical references (leaves [145]-150).
15

Consumers' adoption of online financial services the case of Taiwan /

Chang, Chih-Chia. January 1900 (has links)
Thesis (D.B.A.)--Alliant International University, San Diego, 2009. / Adviser: Rene M. Naert. Includes bibliographical references.
16

An analysis of consumer usage of computer consoles for credit cards, an empirical exploration of retail customer behavior /

Straw, Steven White, January 1976 (has links)
Thesis (Ph. D.)--Ohio State University, 1976. / Includes bibliographical references (leaves 353-371). Available online via OhioLINK's ETD Center.
17

Business impact of IT on firms and vendors : selected studies on computing technologies and electronic micro-payment system /

See-to, Wing Kuen. January 2005 (has links)
Thesis (Ph.D.)--Hong Kong University of Science and Technology, 2005. / Includes bibliographical references (leaves 135-150). Also available in electronic version.
18

Exploring the factors influencing the adoption and extent of use of electronic payment systems (EPS) by small and medium enterprises (SMEs) in Nigeria

Igudia, Patrick Ohunmah January 2015 (has links)
SMEs are slow adopters of new technologies and understandably so because they are entangled in a vicious cycle of poverty. It is even more so for SMEs located in developing markets such as the sub-Saharan Africa. SMEs in these areas are faced with several difficult institutional and cultural bottlenecks which often impede their access to and use of new technologies. In Nigeria, the recently introduced cashless policy is one of many strategies intended to enhance SMEs' chances in the global e-commerce market as much as the general Nigerian economy. Studies reveal that Nigerian SMEs are slow to adopt and use this new technological innovation called the e-payment system (EPS) even when it can improve their chances to participate successfully in e-commerce. However, there is little in the literature to understand why and what is needed to be done to encourage and facilitate their participation in adopting and using this technology. This area of study has not been sufficiently explored. Thus, this thesis fills the void and explores the factors influencing EPS adoption and extent of use by SMEs in Nigeria. The study develops an integrated model drawing from the Technology-Organisation- Environment (TOE) framework and Diffusion of Innovation (DOI) model. We employed the mixed methods. 239 respondents were served the questionnaire. Also, 4 SMEs and two stakeholders were interviewed as a follow-up to the statistical analysis. We employed the Logistic regression analysis in addition to the personal interviews analysis. The results revealed that technological, environmental and owner/manager's factors majorly influenced the adoption of EPS among SMEs in Nigeria. The study finds that perceived benefit is the single major factor positively influencing the decision to adopt and use EPS in Nigeria. Others are owner/manager's educational level and knowledge in IT. The study also finds that perceived complexity, perceived insecurity and lack of government policy are major barriers to the adoption of EPS. Age, perceived benefits, and perceived trust facilitated frequent EPS usage while age, perceived complexity and competitive pressure positively influenced the number and type of EPS channels used by SMEs in Nigeria.
19

Electronic payment and security on the Internet

Marais, Terrence K. 12 1900 (has links)
Thesis (MBA)--Stellenbosch University, 2002. / ENGLISH ABSTRACT: The greatest potential worry that an on-line shopper has is what happens to his/her credit card details from the moment "submit" is pressed on the computer. Is it possible for someone on the Internet to intercept the message and use credit card details maliciously? Also, there is a lot of talk about personal details being encrypted, but how sure is one that this was indeed the case once "submit" has been pressed? Is there a way in which one can be sure that a transaction will occur only once? Many of the security issues are new and many experts are only learning how to deal with these now. This thesis offers suggestions and strategies a user can follow to minimize misuse and abuse of payment details. Electronic payment is the backbone of e-commerce, and the biggest threat towards widespread acceptance and usage of e-commerce is security. Many innovative solutions have been developed by vendors to address security issues. For example, the Secure Electronic Transfer (SET) protocol was developed to ensure that credit card transactions could be conducted safely and securely on the Internet. Secure Socket Layer (SSL) ensures that all communications and transactions are conducted in a tightly secure environment. This is critical for online or mobile banking and other financial activities. Others developments include payment systems that ensure that credit card details are never exposed to a merchant (e.g. SET), while some ensure that credit card numbers never enter the Internet. The five corner stones of security are confidentiality, privacy, authentication, integrity and non-repudiation. Authentication, non-repudiation and integrity can be resolved with digital certificates, digital timestamps and digital signatures. Message confidentiality, on the other hand, is ensured through the use of strong encryption. Encryption systems mutilate data or a message to such an extent that it is totally useless to someone who does not have the appropriate algorithm and key to decode it. The most widely used encryption schemes are the secret key and public key encryption systems. The public key cryptosystem generates two keys, called a public and private key. The public key can be made generally known, but the private key must be kept secret. A unique property of the scheme is that once data is encrypted with one key, only the corresponding other key of the pair can decrypt it. This makes it possible to address issues of authentication, integrity and non-repudiation. Traditional payment instruments such as cash, cheques, debit and credit card transactions are being replaced by their electronic equivalents. The driving forces behind these are transactional security, efficiency and speed. Novel payment solutions and strategies have been devised to meet the challenges of this new economy. For example, smart cards can act as an electronic purse that can hold electronic money. Other information, such as personal details, medical records, driver's licence, etc. can also be stored on the card. Whilst many security experts are in agreement that security is not a barrier anymore for wider usage of the Internet for financial transactions, many consumers are still apprehensive about how secure and safe it really is. This work aims to diminish those fears and show that the Internet is safe for business. / AFRIKAANSE OPSOMMING: Een van die grootste bekommernisse wat 'n kliënt met aankope op die Internet kan ondervind, is die onsekerheid wat presies gebeur nadat betalings aangegaan is en "Submit" is gedruk. Is dit moontlik dat iemand die boodskap kan onderskep en betaling besonderhede vir eie gebruik kan herwin? Daar is ook baie publisiteit oor kodifisering, maar hoe kan die klient verseker wees dat betalings besonderhede wel gekodifiseer is wanneer "Submit" gedruk was? Is daar 'n manier waarmee 'n mens verseker kan wees dat betaling slegs eenkeer gaan geskied? Baie van die sekuriteits lokvalle is nuut en sekuritiets kenners is tans besig om te leer hoe om die probleme te hanteer. Die werkstuk offer wenke en strategieë vir die verbruiker om die misbruik van betaling besondehede op die Internet te minimiseer. Elektronies betalings meganisme is die ruggraat van elektroniese besigheid, en die grootste struikelblok tot die grootskaalse gebruik daarvan is sekuriteit. Daar is baie innoverende oplossings om die probleme hok te slaan. By voorbeeld, die Secure Electronic Transfer (SET) protokol was ontwikkel om te verseker dat betalings met kredietkaart met hoë sekuriteit en veiligheid aangegaan kan word. Secure Socket Layers (SSL), verseker dat alle kommunikasies en transaksies in 'n sekuur en veilige omgewing plaasvind. Dit is veral krities wanneer die verbruiker gebruik maak van die Internet of vanaf selfone om transaksies aan te gaan met 'n bank. Ander ontwikkelinge sluit in betalings metodes wat verseker dat die handelaar nooit die kredietkaart besonderhede sien nie (bv. SET). Ander verseker weer dat die betalings besonderhede nooit oor die Internet hoef gestuur te word nie. Die vyf hoekstene van sekuriteit is konfidensialiteit, privaatheid, outentisiteit, integriteit en non-repudiasie. Outentisiteit, integriteit en non-repudiasie word opgelos deur die gebruik maak van digitale sertifikate, digitale tydstempels en digitale handtekeninge. Konfidensialiteit kan verseker word deur die boodskap te kodifiseer. Kodifikasie behels die verandering van data of boodskappe op so 'n wyse dat dit van geen betekenis is vir 'n persoon wat nie die korrekte algoritme en sleutel het om dit te dekodifiseer nie. Die geheime en publieke kodifiserings stelsels word die meeste gebruik om data te kodifiseer. Die publieke kodifiserings stelsel genereer twee sleutels, naamlik 'n privaat en publieke sleutel. Die publieke sleutel kan alom bekend gemaak word, maar die private sleutel moet slegs bekend wees aan sy gebruiker. 'n Unieke eienskap van die stelsel is dat indien 'n boodskap gekodifiseer is met een sleutel, slegs die ander sleutel van die paar dit sal kan dekodifiseer. Dit maak dit moontlik om outentisiteit, integriteit en non-repudiasie toe te pas. Die tradisionele metodes van betaling soos kontant, tjek en debiet of kredietkaart, gaan mettertyd vervang word deur hul elektroniese eweknie. Die dryfkrag agter die verskynsel is die hoë sekuriteit, doeltreffendheid en spoed waarmee transaksies op die manier gehanteer kan word. Vindingryke betaling metodes is ontdek om die besondere uitdagings van die nuwe ekonomie aan te speek. Byvoorbeeld, knap kaarte kan gebruik word as 'n elektroniese beursie wat elektroniese geld bêre. Ander persoonlike inligting, mediese records, bestuurlisensies, ens. kan ook op die kaart geberg word. Terwyl baie sekuriteits kenners glo dat sekuriteit nie meer 'n stuikelblok is om die Internet vir besigheids transaksies te gebruik nie, bly baie van die verbruikers skepties. Die werkstuk se doel is om daardie onsekerhede uit die weg te ruim, deur te verduidelik hoe sekuriteit toe gepas word, en om te bewys dat die Internet interdaad veilig is as a medium vir besigheids transaksies.
20

Theoretical examination and practical implementation on cryptography algorithms, digital money protocols and related applications.

January 1998 (has links)
by Shek Wong. / Thesis submitted in: December 1997. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1998. / Includes bibliographical references (leaves 90-[94]). / Abstract also in Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Electronic Commerce --- p.3 / Chapter 1.2 --- Electronic Cash --- p.7 / Chapter 1.3 --- What This Report Contains --- p.9 / Chapter 2 --- Cryptographic Background --- p.11 / Chapter 2.1 --- Euler Totient Function --- p.12 / Chapter 2.2 --- Fermat's Little Theorem --- p.12 / Chapter 2.3 --- Quadratic Residues --- p.12 / Chapter 2.4 --- Legendre Symbol --- p.13 / Chapter 2.5 --- Jacobi Symbol --- p.14 / Chapter 2.6 --- Blum Integer --- p.16 / Chapter 2.7 --- Williams Integer --- p.18 / Chapter 2.8 --- The Quadratic Residuosity Problem --- p.19 / Chapter 2.9 --- The Factorization Problem --- p.20 / Chapter 2.10 --- The Discrete Logarithm Problem --- p.20 / Chapter 2.11 --- One-way Functions --- p.21 / Chapter 2.12 --- Blind Signature --- p.22 / Chapter 2.13 --- Cut-and-choose Methodology --- p.24 / Chapter 3 --- Anatomy and Panorama of Electronic Cash --- p.26 / Chapter 3.1 --- Anatomy of Electronic Cash --- p.26 / Chapter 3.1.1 --- Three Functions and Six Criteria --- p.28 / Chapter 3.1.2 --- Untraceable --- p.29 / Chapter 3.1.3 --- Online and Off-line --- p.30 / Chapter 3.1.4 --- Security --- p.32 / Chapter 3.1.5 --- Transferability --- p.33 / Chapter 3.2 --- Panorama of Electronic Cash --- p.34 / Chapter 3.2.1 --- First Model of Off-line Electronic Cash --- p.34 / Chapter 3.2.2 --- Successors --- p.35 / Chapter 3.2.3 --- Binary Tree Based Divisible Electronic Cash --- p.36 / Chapter 4 --- Spending Limit Enforced Electronic Cash --- p.37 / Chapter 4.1 --- Introduction to Spending Limit Enforced Electronic Cash --- p.37 / Chapter 4.2 --- The Scheme --- p.41 / Chapter 4.3 --- An Example --- p.44 / Chapter 4.4 --- Techniques --- p.47 / Chapter 4.5 --- Security and Efficiency --- p.51 / Chapter 5 --- Interest-bearing Electronic Cash --- p.53 / Chapter 5.1 --- Introduction to Interest-bearing Electronic Cash --- p.53 / Chapter 5.2 --- An Example --- p.55 / Chapter 5.3 --- The Scheme --- p.55 / Chapter 5.4 --- Security --- p.57 / Chapter 5.5 --- An Integrated Scheme --- p.58 / Chapter 5.6 --- Applications --- p.59 / Chapter 6 --- Abacus Type Electronic Cash --- p.61 / Chapter 6.1 --- Introduction --- p.61 / Chapter 6.2 --- Abacus Model --- p.63 / Chapter 6.3 --- Divisible Abacus Electronic Coins --- p.66 / Chapter 6.3.1 --- Binary Tree Abacus Approach --- p.66 / Chapter 6.3.2 --- Multi-tree Approach --- p.57 / Chapter 6.3.3 --- Analysis --- p.69 / Chapter 6.4 --- Abacus Electronic Cash System --- p.71 / Chapter 6.4.1 --- Opening Protocol --- p.71 / Chapter 6.4.2 --- Withdrawal Protocol --- p.74 / Chapter 6.4.3 --- Payment and Deposit Protocol --- p.75 / Chapter 6.5 --- Anonymity and System Efficiency --- p.78 / Chapter 7 --- Conclusions --- p.80 / Chapter A --- Internet Payment Systems --- p.82 / Chapter A.1 --- Bare Web FORM --- p.82 / Chapter A.2 --- Secure Web FORM Payment System --- p.85 / Chapter A.3 --- Membership Type Payment System --- p.86 / Chapter A.4 --- Agent Based Payment System --- p.87 / Chapter A.5 --- Internet-based POS --- p.87 / B Papers derived from this thesis --- p.89 / Bibliography --- p.90

Page generated in 0.1118 seconds