• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 52
  • 9
  • 8
  • 7
  • 6
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 82
  • 82
  • 22
  • 15
  • 15
  • 13
  • 10
  • 10
  • 9
  • 9
  • 9
  • 9
  • 9
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Banking Swaziland's unbanked

Thring, Kevin Conrad 15 August 2008 (has links)
The attention of information, communications, and technology (ICT) designers, developers, implementers, consultants, and venture capitalists, in the banking arena, has been focused on the corporate sector and on the commercial and corporate applications of ICT. Banking technology usage such as those by lower-income communities, have been marginalised and largely left unattended. During the past five years, activities, behaviours, and attitudes of the financial services industry increased, in favour of the under-serviced mass market. Global growth of electronic payment banking systems and usage has brought about a considerable amount of technological advancement. The low-income market has become a subject of interest by ICT solution providers, banks and credit-offering incumbents , academics, government, and alternative non-banks and non-governmental organisations (NGO’s). Despite the global increase in interest and technology usage, the inability to act on the augment, within the borders of Swaziland, is the primal focus of this research. Swaziland’s mass market can be transformed and banked through the proper deployment of ICTs. The ability to bank the un-banked, in viewing ICT as the enabler of the small society along with its various communities; those excluded because of cultural and educational restrictions; physical location and low income constraints; the disabled etc., can be achieved. This dissertation investigates and analyses the present situation of banking in Swaziland, the related entities involved, and attempts to formulate an appropriate strategy for the successful implementation of a suitable banking solution in the Swazi context. This includes the recognition that access, to any ICT, in itself is insufficient, and illustrates, through the use of community informatics (CI), systems theory, change management theory, and the essential pre-study towards the utilisation of ICT deployed on a grand scale. / Dissertation (MCom)--University of Pretoria, 2008. / Informatics / unrestricted
32

Smart card technology and its perspective in Hong Kong.

January 1997 (has links)
by Yu Wai-Yip. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1997. / Includes bibliographical references (leaves 51-57). / TABLE OF CONTENTS --- p.i / LIST OF EXHIBITS --- p.iii / Chapter / Chapter I. --- INTRODUCTION --- p.1 / Project Objectives --- p.3 / Methodology --- p.3 / Chapter II. --- WHAT IS SMART CARD --- p.5 / A Brief History of Smart Card --- p.5 / Classifications of Smart Card --- p.7 / Categorization by Security Level / Contact Vs Contactless / Chapter III. --- EVOLUTION OF SMART CARD MARKETS --- p.11 / Smart Card Versus Magnetic Stripe Card --- p.11 / Possible Applications --- p.13 / Payment Applications / Transportation Applications / Healthcare Applications / Telecommuncations Applications / Global Market Trend --- p.22 / Chapter IV. --- SMART CARD APPLICATIONS IN HONG KONG --- p.25 / Transportation Applications --- p.27 / Healthcare Applications --- p.28 / Payment Applications --- p.30 / Mondex Card and Visa Cash Card / Hong Kong Jockey Club Smart Card / Identification Applications --- p.32 / Chapter V. --- ANALYSIS OF THE HONG KONG SMART CARD MARKET --- p.33 / Smart Card as An Individual Product --- p.34 / Smart Card as a Form of Monetary Exchange --- p.34 / Smart Card as a System --- p.36 / Technological Environment / Political-legal Environment / Competitive Environment / Economic Environment / Socio-cultural Environment / Perspertive of All-in-one Smart Card in Hong Kong --- p.43 / Chapter VI --- SUMMARY AND CONCLUSIONS --- p.47 / Summary --- p.47 / Conclusions --- p.48 / BIBLIOGRAPHY --- p.51
33

UM MODELO PARA PROTEÇÃO DE TRILHAS DE AUDITORIA EM SISTEMAS DE IDENTIFICAÇÃO ELETRÔNICA / A MANAGEMENT MODEL FOR AUDIT TRAILS IN IDENTIFICATION ELECTRONIC SYSTEMS

Liberali, Ernâni Teixeira 21 May 2012 (has links)
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / With the continuing demand for services and information in multiple places in real time, companies are dealing with increasingly sensitive information for their business and many of them are not prepared to undertake the management of these information. In information systems, audit trails, also called audit logs, are records of activities from users and administrators. Audit trails help companies to keep a historical control of changes in information, but they do not safeguard the vulnerability of improper handling of these tracks nor eliminate traces of malicious changes, such as what might happen with the use of smart cards for micro-payments in educational institutions, which is a trend. This dissertation presents a model for protection of trails (logs) that can be used as a solution to problems on treatment and protection of audit trails. The model is based on data encryption and the sharing of responsibility in the care of registry keys, giving condition to guarantee the validity of information in systems of identification and payments. It was validated in the replica database to the payment system from the restaurant at Federal University of Santa Maria. / Com a contínua demanda por disponibilidade de serviços e de informações em diversos locais e em tempo real, as empresas estão tendo que lidar com informações cada vez mais sensíveis aos negócios, onde muitas delas não estão preparadas para realizar a gestão destas informações. Nos sistemas de informação, trilhas de auditoria, também chamadas de logs de auditoria, são registros das atividades de usuários e administradores. As trilhas de auditoria auxiliam as empresas a manterem um controle histórico sobre alterações nas informações, mas não eliminam a vulnerabilidade de manipulação indevida destas trilhas para eliminar rastros de modificações maliciosas, tal como o que pode acontecer no uso de smart cards para realização de micro pagamentos em instituições do setor educacional, o que é uma tendência. Este trabalho apresenta um modelo de proteção de trilhas (logs) que pode ser utilizado como solução para o problema do tratamento e proteção das trilhas de auditoria. O modelo é baseado em criptografia dos dados e em divisão de responsabilidades na guarda das chaves do registro, possibilitando condições de se garantir a legitimidade das informações em sistemas de identificação e pagamento, e foi validado junto ao banco de dados réplica ao sistema de pagamentos do Restaurante Universitário da Universidade Federal de Santa Maria.
34

Smart card business strategy in Hong Kong

Au, Po-ling, Lisa., 區寶玲. January 1998 (has links)
published_or_final_version / Business Administration / Master / Master of Business Administration
35

Public transport pricing: a case study of theapplication of the smart card in the bus industry

Leung, Hon-man, Coleman., 梁漢文. January 1999 (has links)
published_or_final_version / Transport Policy and Planning / Master / Master of Arts
36

The use of "Octopus" smart card in the secondary schooladministration

Lai, Tsz-wan, 黎子雲 January 2002 (has links)
published_or_final_version / Education / Master / Master of Science in Information Technology in Education
37

E-commerce and its derived applications: smart card certificate system and recoverable and untraceable electronic cash.

January 2001 (has links)
by Liu Kai Sui. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2001. / Includes bibliographical references (leaves 67-71). / Abstracts in English and Chinese. / Chapter 1. --- Introduction --- p.1 / Chapter 1.1 --- Security and E-commerce --- p.3 / Chapter 1.2 --- E-commerce: More than Commercial Activities --- p.4 / Chapter 1.3 --- What This Thesis Contains --- p.5 / Chapter 2. --- Introduction to Cryptographic Theories --- p.7 / Chapter 2.1 --- Six Cryptographic Primitives --- p.7 / Chapter 2.1.1 --- Symmetric Encryption --- p.8 / Chapter 2.1.2 --- Asymmetric Encryption --- p.8 / Chapter 2.1.3 --- Digital Signature --- p.9 / Chapter 2.1.4 --- Message Digest --- p.9 / Chapter 2.1.5 --- Digital Certificate and Certificate Authority --- p.10 / Chapter 2.1.6 --- Zero-Knowledge Proof --- p.11 / Chapter 2.2 --- The RSA Public Key Cryptosystem --- p.12 / Chapter 2.3 --- The ElGamal Public Key Encryption Scheme --- p.13 / Chapter 2.4 --- Elliptic Curve Cryptosystem --- p.14 / Chapter 2.4.1 --- The Algorithm of Elliptic Curve Cryptosystem --- p.15 / Chapter 2.5 --- Different kinds of Digital Signature --- p.16 / Chapter 2.5.1 --- RSA Digital Signature --- p.16 / Chapter 2.5.2 --- Elliptic Curve Nyberg-Rueppel Digital Signature --- p.16 / Chapter 2.6 --- Blind Signature --- p.17 / Chapter 2.7 --- Cut-and-choose protocol --- p.18 / Chapter 2.8 --- Diffie-Hellman Key Exchange --- p.19 / Chapter 3. --- "Introduction to E-commerce, M-commerce and Rich Media M-commerce" --- p.20 / Chapter 3.1 --- 1st Generation of E-commerce --- p.21 / Chapter 3.2 --- 2nd Generation of E-commerce ´ؤ M-commerce --- p.21 / Chapter 3.3 --- 3rd Generation of E-commerce - Rich Media M-commerce --- p.23 / Chapter 3.4 --- Payment Systems used in E-commerce --- p.23 / Chapter 3.4.1 --- Electronic Cash --- p.23 / Chapter 3.4.2 --- Credit Card --- p.24 / Chapter 3.4.3 --- Combined Payment System --- p.24 / Chapter 4. --- Introduction to Smart Card --- p.25 / Chapter 4.1 --- What is Smart Card? --- p.25 / Chapter 4.2 --- Advantages of Smart Cards --- p.26 / Chapter 4.2.1 --- Protable Device --- p.26 / Chapter 4.2.2 --- Multi-applications --- p.26 / Chapter 4.2.3 --- Computation Power --- p.26 / Chapter 4.2.4 --- Security Features --- p.27 / Chapter 4.3 --- What can Smart Cards Do? --- p.27 / Chapter 4.4 --- Java Card --- p.28 / Chapter 5. --- A New Smart Card Certificate System --- p.30 / Chapter 5.1 --- Introduction --- p.31 / Chapter 5.2 --- Comparison between RSA and ECC --- p.32 / Chapter 5.3 --- System Architecture --- p.33 / Chapter 5.3.1 --- System Setup --- p.33 / Chapter 5.3.2 --- Apply for a certificate --- p.34 / Chapter 5.3.3 --- Verification of Alice --- p.35 / Chapter 5.3.4 --- "Other Certificates ´ؤ the ""Hyper-Link"" concept" --- p.36 / Chapter 5.3.4.1 --- "Generation of the ""hyper-link""" --- p.37 / Chapter 5.3.4.2 --- "Verification ofAlice using the ""hyper-link""" --- p.37 / Chapter 5.3.5 --- Multiple Applications --- p.38 / Chapter 5.4 --- Security Analysis --- p.39 / Chapter 5.4.1 --- No Crypto-processor is needed --- p.40 / Chapter 5.4.2 --- PIN Protect --- p.40 / Chapter 5.4.3 --- Digital Certificate Protect --- p.40 / Chapter 5.4.4 --- Private Key is never left the smart card --- p.41 / Chapter 5.5 --- Extensions --- p.41 / Chapter 5.5.1 --- Biometrics Security --- p.41 / Chapter 5.5.2 --- E-Voting --- p.41 / Chapter 5.6 --- Conclusion --- p.42 / Chapter 6. --- Introduction to Electronic Cash --- p.44 / Chapter 6.1 --- Introduction --- p.44 / Chapter 6.2 --- The Basic Requirements --- p.45 / Chapter 6.3 --- Advantages of Electronic Cash over other kinds of payment systems --- p.46 / Chapter 6.3.1 --- Privacy --- p.46 / Chapter 6.3.2 --- Off-line payment --- p.47 / Chapter 6.3.3 --- Suitable for Small Amount Payment --- p.47 / Chapter 6.4 --- Basic Model of Electronic Cash --- p.48 / Chapter 6.5 --- Examples of Electronic Cash --- p.49 / Chapter 6.5.1 --- eCash --- p.49 / Chapter 6.5.2 --- Mondex --- p.49 / Chapter 6.5.3 --- Octopus Card --- p.50 / Chapter 7. --- A New Recoverable and Untraceable Electronic Cash --- p.51 / Chapter 7.1 --- Introduction --- p.52 / Chapter 7.2 --- The Basic Idea --- p.52 / Chapter 7.3 --- S. Brand's Single Term E-cash Protocol --- p.54 / Chapter 7.3.1 --- The Setup of the System --- p.54 / Chapter 7.3.2 --- The Withdrawal Protocol --- p.54 / Chapter 7.3.3 --- The Payment Protocol --- p.55 / Chapter 7.3.4 --- The Deposit Protocol --- p.56 / Chapter 7.4 --- The Proposed Protocol --- p.57 / Chapter 7.4.1 --- The Withdrawal Protocol --- p.57 / Chapter 7.4.2 --- The Payment Protocol --- p.58 / Chapter 7.4.3 --- The Deposit Protocol --- p.58 / Chapter 7.4.4. --- The Recovery Protocol --- p.59 / Chapter 7.5 --- Security Analysis --- p.60 / Chapter 7.5.1 --- Conditional Untraceability --- p.60 / Chapter 7.5.2 --- Cheating --- p.60 / Chapter 7.6 --- Extension --- p.60 / Chapter 7.7 --- Conclusion --- p.62 / Chapter 8. --- Conclusion --- p.63 / Appendix: Paper derived from this thesis --- p.66 / Bibliography --- p.67
38

Mining of popular paths with privacy protection and its applications.

January 2006 (has links)
Cheong Chi Hong. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2006. / Includes bibliographical references (leaves 81-86). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.v / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Problem statement --- p.1 / Chapter 1.2 --- Major contributions --- p.4 / Chapter 1.3 --- Thesis organization --- p.4 / Chapter 2 --- Smart Card System --- p.6 / Chapter 2.1 --- Introduction --- p.7 / Chapter 2.2 --- Related Work --- p.11 / Chapter 2.2.1 --- Mining Customer Behaviors --- p.11 / Chapter 2.2.2 --- Privacy Preserving Data Mining --- p.12 / Chapter 2.2.3 --- Definitions of Privacy --- p.13 / Chapter 2.3 --- Model --- p.14 / Chapter 2.4 --- Algorithms --- p.17 / Chapter 2.4.1 --- Baseline Algorithm --- p.17 / Chapter 2.4.2 --- Privacy Equation --- p.19 / Chapter 2.4.3 --- Random Subsequence Selection Algorithm (RSSA) --- p.20 / Chapter 2.4.4 --- Popular Item Selection Algorithm (PISA) --- p.21 / Chapter 2.5 --- Analysis --- p.26 / Chapter 2.5.1 --- Accuracy --- p.26 / Chapter 2.5.2 --- Analysis of RSSA: Determine te values --- p.27 / Chapter 2.5.3 --- Analysis of RSSA: Accuracy --- p.30 / Chapter 2.5.4 --- Analysis of PISA --- p.33 / Chapter 2.5.5 --- Theoretical Proof of PISA --- p.41 / Chapter 2.5.6 --- Privacy Protection --- p.42 / Chapter 2.6 --- Simulations --- p.45 / Chapter 3 --- Transportation System --- p.48 / Chapter 3.1 --- Introduction --- p.49 / Chapter 3.2 --- Related Work --- p.51 / Chapter 3.3 --- Model --- p.56 / Chapter 3.4 --- Algorithms --- p.60 / Chapter 3.5 --- Simulations --- p.63 / Chapter 4 --- Enhanced Features in a Smart Card System --- p.67 / Chapter 4.1 --- Adding Time Information --- p.68 / Chapter 4.1.1 --- Motivation --- p.68 / Chapter 4.1.2 --- Time Intervals --- p.68 / Chapter 4.1.3 --- Original Graph --- p.69 / Chapter 4.1.4 --- New Graph --- p.70 / Chapter 4.1.5 --- Adding the New Graph into the Model --- p.72 / Chapter 4.1.6 --- Rewriting the Definition of a Path --- p.73 / Chapter 4.1.7 --- Drawback of Adding Time Information --- p.73 / Chapter 4.2 --- Generalization --- p.75 / Chapter 4.2.1 --- Motivation --- p.75 / Chapter 4.2.2 --- Generalization --- p.75 / Chapter 4.3 --- Specialization vs. Generalization --- p.75 / Chapter 5 --- Conclusion --- p.79 / Bibliography --- p.81
39

En studie av zero knowledge-identifikationsprotokoll för smarta kort / A study of zero knowledge identification protocols for smart cards

Mellström, Björn January 2004 (has links)
<p>Zero knowledge protocols is a lesser known type of protocol that can be used for identification. These protocols are especially designed not to reveal any information during an identification process that can be misused later on, neither by the one who should be convinced of the identity of the user, nor by anyone else that is eavesdropping. Many of these protocols are also especially designed for implementation in smart cards. The more common type of card with a magnetic stripe has during the last few years become more susceptible to attacks since they are easily copied. Smart cards combined with a secure identification protocol has been predicted to be the solution to this problem. Zero knowledge protocols are one of several types of protocols that can be used for this purpose. </p><p>In this thesis a number of zero knowledge protocols are examined that have been presented since the introduction of the concept in the 1980's. In addition to the protocol descriptions information is also given about how to choose parameter values, and what progress and discoveries have been made concerning the security of the protocols. Some assumptions that are easy to overlook in an implementation are also highlighted, and an evaluation of the protocol performances is made. </p><p>The conclusion is that zero knowledge protocols are both efficient and adaptable, while they at the same time provide high security. Because of this it may not be necessary to compromise between these properties even for simpler types of smart cards.</p>
40

Remote Password Authentication Scheme with Smart Cards and Biometrics

Lin, Yi-Hui 26 July 2006 (has links)
More and more researchers combine biometrics with passwords and smart cards to design remote authentication schemes for the purpose of high-degree security. However, in most of these authentication schemes proposed in the literatures so far, biometric characteristics are verified in the smart cards only, not in the remote servers, during the authentication processes. Although this kind of design can prevent the biometric data of the users from being known to the servers, it will result in that they are not real three-factor authentication schemes and therefore some security flaws may occur since the remote servers do not indeed verify the security factor of biometrics. In this thesis we propose a truly three-factor remote authentication scheme where all of the three security factors, passwords, smart cards, and biometric characteristics, are examined in the remote servers. Especially, the proposed scheme fully preserves the privacy of the biometric data of every user, that is, the scheme does not reveal the biometric data to anyone else, including the remote servers. Furthermore, we also demonstrate that the proposed scheme is immune to both the replay attacks and the offline-dictionary attacks and it achieves the requirement of low-computation cost for smart-card users. Finally, we give a formal analysis based on the GNY logic to prove that our goals are achieved.

Page generated in 0.082 seconds