Elkamchouchi, 2013 - Google Patents
An Improvement to the SET Protocol Based On SigncryptionElkamchouchi, 2013
View PDF- Document ID
- 5572674867729477759
- Author
- Elkamchouchi H
- Publication year
- Publication venue
- International Journal on Cryptography and Information Security (IJCIS)
External Links
Snippet
Electronic commerce, as exemplified by the popularity of the Internet, is becoming more important along with fast progress in communications and information technology. The SET (Secure Electronic Transaction) protocol is a scheme designed to ensure that merchants …
- 238000005516 engineering process 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Card specific authentication in transaction processing
- G06Q20/4097—Mutual authentication between card and transaction partners
- G06Q20/40975—Use of encryption for mutual authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes involving intelligent token, e.g. electronic purse
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes involving intelligent token, e.g. electronic purse involving authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bellare et al. | iKP-A Family of Secure Electronic Payment Protocols. | |
AU2014290143B2 (en) | Secure remote payment transaction processing | |
Eslami et al. | A new untraceable off-line electronic cash system | |
Gupta et al. | Role of multiple encryption in secure electronic transaction | |
CA2921008A1 (en) | Secure remote payment transaction processing using a secure element | |
AU2014265054A1 (en) | Systems and methods for software based encryption | |
TWI591553B (en) | Systems and methods for mobile devices to trade financial documents | |
JP2004005643A (en) | Anonymous payment method verifiable by defined party | |
CN101295384A (en) | Electronic payment method | |
CN111369251B (en) | Block chain transaction supervision method based on user secondary identity structure | |
Luo et al. | Offline transferable E-cash mechanism | |
Lee et al. | Traceability of double spending in secure electronic cash system | |
CN107403310A (en) | Payment system and its method of payment under quantum Metropolitan Area Network (MAN) | |
Tripathi et al. | LPMP: an efficient lightweight protocol for mobile payment | |
CN113793149B (en) | Off-line transaction authentication system, method, central server and client | |
Elkamchouchi | An Improvement to the SET Protocol Based On Signcryption | |
Foo et al. | A payment scheme using vouchers | |
Wang et al. | Building a consumer scalable anonymity payment protocol for Internet purchases | |
Chang et al. | A highly efficient and secure electronic cash system based on secure sharing in cloud environment | |
Yen et al. | A fair-exchange e-payment protocol for digital products with customer unlinkability. | |
Al-Bastaki et al. | Task based Interdisciplinary E-Commerce Course with UML Sequence Diagrams, Algorithm Transformations and Spatial Circuits to Boost Learning Information Security Concepts | |
Tso et al. | An off-line mobile payment protocol providing double-spending detection | |
Al-Meaither et al. | A secure electronic Murabaha transaction | |
Zhang et al. | An anonymous digital cash and fair payment protocol utilizing smart card in mobile environments | |
San et al. | Efficient offline micropayment protocol for multi-vendor |