Peppercoin Micropayments
|
|
|
- Godwin Stokes
- 9 years ago
- Views:
Transcription
1 Peppercoin Micropayments Ronald L. Rivest MIT CSAIL (joint work with Prof. Silvio Micali)
2 Outline Micropayment examples Challenges Aggregation methods The Peppercoin method (In England a peppercorn is smallest amount that can be paid in a contract)
3 What is a micropayment? A payment in the range 0.1 to $10. A payment small enough that processing it is relatively costly. (Processing one credit-card payment costs about 25 ) Processing cost is the key issue for micropayment methods.
4 Lydians invented coins 640 B.C. Before 640 B.C.: gold bars, barter small purchases difficult. After 640 B.C.: coins small purchases easy. Before 2003: credit cards small on-line purchases difficult. After 2003:
5 Generic Payment Framework Consumer PSP Authorization Billing Settlement Merchant PSP Deposit(s) Consumer Alice Payment(s) Merchant Bob
6 How we ll make small payments Web download Music (even streaming) Mobile phone Map Ringtones Physical POS Vending machine
7 Challenges: Ease-of-use Low-Cost Extending existing payment framework Security (many other issues, too)
8 Aggregation To reduce cost, micropayments must be aggregated into fewer macropayments. Possible levels of aggregation: None: Every payment deposited with PSP Merchant-level: A consumer s payments are aggregated by merchant MicroPSP: Monopoly service that disintermediates existing payment services; doesn t scale well Universal: Payments aggregated across all users and merchants, even those supported by different cooperating PSPs
9 No Aggregation Bill Alice Inefficient!
10 Previous Work: Digital Cash Example: Chaum s digital coins Emphasis on anonymity: Withdrawals use blind signatures Problem of double-spending handled by having doubler-spenders revealed (e.g. Brand s protocol) No aggregation: every coin spent is returned to the PSP.
11 Merchant-Level Aggregation Bill Alice Only works sometimes!
12 Previous Work: PayWord Rivest and Shamir 96 Emphasis on reducing public-key operations by using per user/merchant hash-chains instead: x 0 x 1 x 2 x 3 x n User signs x 0 over to merchant and releases next x i for next payment Merchant-level aggregation only.
13 MicroPSP Aggregation Bill MicroPSP Alice Doesn t scale up!
14 Universal Aggregation Universal aggregation dramatically reduces processing cost, independent of spending patterns. Also called many/many/many aggregation: Aggregates payments from Many consumers Many merchants Many PSP s in any combination. No need to aggregate sales per consumer.
15 Universal Aggregation Idea Would merchant prefer: (a) twenty 50 cent payments, or (b) $0 for 19 payments, and $10 for one? No difference to merchant, on average
16 Universal Aggregation Idea Would merchant prefer: (a) twenty 50 cent payments, or (b) $0 for 19 payments, and $10 for one? No difference to merchant, on average. What if processing costs 20 cents per payment? (a) nets only 30 cents per payment (b) nets 49 cents net per payment! Merchant strongly prefers (b)!
17 Peppercoin s Universal Aggregation One micropayment in 20 is cryptographically selected by merchant, and deposited for 20x its value, as a macropayment! Yet consumer pays only for what she has spent: each micropayment records cumulative amount she has spent at all merchants.
18 Peppercoin s Universal Aggregation 50 cents Alice ($8.50 cumulative) 19 / 20 Log
19 Peppercoin s Universal Aggregation 50 cents Charles ($12.79 cumulative) 19 / 20 Log
20 Peppercoin s Universal Aggregation $10 Bill $11 (exactly cover cumulative amount she spent at all merchants) $10 1 / cents Alice ($11.00 cumulative) Efficient always and scalable:!! 20 transactions for the cost of 1!!
21 Peppercoin Extends Existing Payment Systems to Micropayments Existing Payment System Macro payments Consumer Alice Merchant Bob Micro payments
22 Dimensions to consider: Aggregation (universal) PSP on-line or off-line? (off-line) Interactive vs. non-interactive (non) (e.g. anti-spam payment in ) Computation Cost (cheap) User-fairness (fair) (many other issues, too)
23 Previous Work: Lottery Tickets Electronic Lottery Tickets as Micropayments Rivest FC 97 (similar to Transactions using Bets proposal by Wheeler 96) Payments are probabilistic First schemes to provide universal aggregation: payments aggregated across all user/merchant pairs.
24 Lottery Tickets Explained Assume micropayments are for ten cents. Merchant gives user y = hash(x) for random x. User writes check: Pay Merchant $10 if two low-order digits of hash -1 (y) are 75. (Signed by user, with cert from his PSP.) Merchant wins $10 with probability 1/100. Expected value of payment is 10 cents. Bank sees only 1 out of every 100 payments. (A plus for user privacy!)
25 Non-interactive Revised check: Pay Merchant $10 if two low-order digits of the hash of Merchant s digital signature on this check are 75. Merchant s deterministic signature scheme unpredictable to user. Merchant can convince PSP to pay.
26 Computation Cost Digital signatures are still relatively expensive --- but much cheaper than they used to be! It now seems reasonable to base micropayments on digital signatures. (E.g. Java card in cell phone) User and merchant are anyways involved with each transaction; digital signatures add only a few milliseconds. On-line/Off-line signature can also help.
27 Optimization for less Signing Pay Merchant $10 if the two loworder digits of the hash of Merchant s digital signature on the date of this check are 75. Merchant only signs once a day.
28 Variable-sized payments To make micropayment of size m: Chance of winning becomes m / M where M is the macropayment size. For example, a $1 micropayment converts to a $10 macropayment with probability 1/10. A one-penny micropayment converts to a $10 macropayment with probability 1/1000.
29 Is revenue variance an issue? Theorem. If Peppercoin reduces merchant fees by R percent of transaction value, then merchant will be ahead (with probability 999,999/1,000,000) after only (5 / R) 2 macropayments have been received. Example: micro = 0.10, macro = $10, otherfee = 0.03, peppercoinfee = 0.01, R = 0.20, (5/R) 2 = 625 or $6250 total value.
30 Fraud models Security is challenging to achieve given that PSP has only partial information, parties may collude, and payment schedules are decoupled. For example, consumer and merchant may try to collude to defraud PSP s. One effective countermeasure is to make macropayment to merchant only from revenues from that specific consumer (perhaps deferring payment if necessary).
31 Conclusion Peppercoin micropayments are Easy to use Low-cost even for small payments Flexible (interface with existing payment systems) Secure Thanks!
32 (The End)
PayWord and MicroMint: Two Simple MicroPayment Schemes
PayWord and MicroMint: Two Simple MicroPayment Schemes Ronald L. Rivest (MIT) Adi Shamir (Weizmann) Outline Micropayments: Framework and Motivation PayWord: : a credit-based scheme using chains of hash
Electronic payment systems
Electronic payment systems overview of basic concepts credit-card based systems (MOTO, SSL, SET) electronic cash systems (DigiCash) micropayment schemes (PayWord, probabilistic schemes) brief history of
Electronic Payments. EITN40 - Advanced Web Security
Electronic Payments EITN40 - Advanced Web Security 1 Card transactions Card-Present Smart Cards Card-Not-Present SET 3D Secure Untraceable E-Cash Micropayments Payword Electronic Lottery Tickets Peppercoin
Cryptography: Authentication, Blind Signatures, and Digital Cash
Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,
Comparing and contrasting micro-payment models for E-commerce systems
Comparing and contrasting micro-payment models for E-commerce systems Xiaoling Dai 1, John Grundy 1 and Bruce W N Lo 2 1 Department of Computer Science University of Auckland Private Bag 92019, Auckland,
4 Electronic Payment Systems
4 Electronic Payment Systems 4.1 Traditional Payment Systems 4.2 Credit-Card Based Payment Standards 4.3 Electronic Cash and Micropayments 4.4 Practice of E-Payment Literature: Donal O Mahony, Michael
Electronic Payment Systems
Foundations of Secure e-commerce (bmevihim219) Dr. Levente Buttyán Associate Professor BME Hálózati Rendszerek és Szolgáltatások Tanszék Lab of Cryptography and System Security (CrySyS) [email protected],
Internet Usage (as of November 1, 2011)
ebusiness Chapter 11 Online Payment Systems Internet Usage (as of November 1, 2011) United States Population: 312,521,655 Internet users: 245,000,000 (78.4% of population) Facebook users: 151,350,260 (61.8%
An Internet Based Anonymous Electronic Cash System
Research Paper American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-4, Issue-4, pp-148-152 www.ajer.org Open Access An Internet Based Anonymous Electronic Cash System
Lecture 2: Complexity Theory Review and Interactive Proofs
600.641 Special Topics in Theoretical Cryptography January 23, 2007 Lecture 2: Complexity Theory Review and Interactive Proofs Instructor: Susan Hohenberger Scribe: Karyn Benson 1 Introduction to Cryptography
Cryptanalysis of a Partially Blind Signature Scheme or How to make $100 bills with $1 and $2 ones
Cryptanalysis of a Partially Blind Signature Scheme or How to make $100 bills with $1 and $2 ones Gwenaëlle Martinet 1, Guillaume Poupard 1, and Philippe Sola 2 1 DCSSI Crypto Lab, 51 boulevard de La Tour-Maubourg
Interoperable Mobile Payment A Requirements-Based Architecture
Interoperable Mobile Payment A Requirements-Based Architecture Dr. Manfred Männle Encorus Technologies GmbH; product management Payment Platform Summary: Existing payment methods like cash and debit/credit
E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Third Edition. Copyright 2007 Pearson Education, Inc.
Copyright 2007 Pearson Education, Inc. Slide 6-1 E-commerce business. technology. society. Third Edition Kenneth C. Laudon Carol Guercio Traver Copyright 2007 Pearson Education, Inc. Slide 6-2 Chapter
7 Electronic Payment Systems
7 Electronic Payment Systems 7.1 Traditional Payment Systems 7.2 Credit-Card Based Payment Standards 7.3 Electronic Cash and Micropayments 7.4 Practice of E- and M-Payment Literature: Donal O!Mahony, Michael
2015-11-02. Electronic Payments Part 1
Electronic Payments Part Card transactions Card-Present Smart Cards Card-Not-Present SET 3D Secure Untraceable E-Cash Micropayments Payword Electronic Lottery Tickets Peppercoin Bitcoin EITN4 - Advanced
MA 1125 Lecture 14 - Expected Values. Friday, February 28, 2014. Objectives: Introduce expected values.
MA 5 Lecture 4 - Expected Values Friday, February 2, 24. Objectives: Introduce expected values.. Means, Variances, and Standard Deviations of Probability Distributions Two classes ago, we computed the
Electronic Payment Systems
Electronic Payment Systems In any commercial transaction payment is an integral part for goods supplied. Four types of payments may be made in e-commerce they are Credit card payments Electronic cheque
Group Blind Digital Signatures: Theory and Applications by Zulækar Amin Ramzan Submitted to the Department of Electrical Engineering and Computer Science in partial fulællment of the requirements for the
Notice of Change in Terms for your Deposit Accounts. Redding Bank of Commerce Deposit Accounts Account Terms and Conditions
Notice of Change in Terms for your Deposit Accounts Terms outlined in this Change in Terms document, the enclosed Deposit Account Agreement and the enclosed Schedule of Fees and Services of Redding Bank
CASH ISA SAVINGS CONDITIONS. For use from 2nd September 2016.
CASH ISA SAVINGS CONDITIONS. For use from 2nd September 2016. WELCOME TO HALIFAX This booklet explains how your Halifax savings account works, and includes its main conditions. This booklet contains: information
The Definition of Electronic Payment
Part IX: epayment Learning Targets What are the electronic means of payment? What is the difference between pico-, micro- and macro-payment? How can we classify the e-payment systems? How can secure transactions
Application of Electronic Currency on the Online Payment System like PayPal
Application of Electronic Currency on the Online Payment System like PayPal Rafael Martínez Peláez, Francisco J. Rico Novella Technical University of Catalonia (UPC), Department of Telematics Engineering
An Analysis of the Bitcoin Electronic Cash System
An Analysis of the Bitcoin Electronic Cash System Danielle Drainville University of Waterloo December 21, 2012 1 Abstract In a world that relies heavily on technology, privacy is sought by many. Privacy,
Probabilistic Strategies: Solutions
Probability Victor Xu Probabilistic Strategies: Solutions Western PA ARML Practice April 3, 2016 1 Problems 1. You roll two 6-sided dice. What s the probability of rolling at least one 6? There is a 1
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
Payment Systems for E-Commerce. Shengyu Jin 4/27/2005
Payment Systems for E-Commerce Shengyu Jin 4/27/2005 Reference Papers 1. Research on electronic payment model,2004 2. An analysis and comparison of different types of electronic payment systems 2001 3.
Store Use Only: Identification requires a valid driver s license and/or government issued photo ID
NTB Credit Card APPLICATION INFORMATION ABOUT YOURSELF First Name Middle Initial Last Name Street Address (No P.O. Boxes) City State Zip Code Home Phone Social Security Number Date of Birth Employer Employer
RSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
Payments and Revenues. Do retail payments really matter to banks?
Payments and Revenues Do retail payments really matter to banks? by Dave Birch Consult Hyperion Opportunities Banks do lots of things, all of which
Electronic Cash Payment Protocols and Systems
Electronic Cash Payment Protocols and Systems Speaker: Jerry Gao Ph.D. San Jose State University email: [email protected] URL: http://www.engr.sjsu.edu/gaojerry May, 2000 Presentation Outline - Overview
Payment systems. Tuomas Aura T-110.4206 Information security technology
Payment systems Tuomas Aura T-110.4206 Information security technology Outline 1. Money transfer 2. Card payments 3. Anonymous payments 2 MONEY TRANSFER 3 Common payment systems Cash Electronic credit
Security in Electronic Payment Systems
Security in Electronic Payment Systems Jan L. Camenisch, Jean-Marc Piveteau, Markus A. Stadler Institute for Theoretical Computer Science, ETH Zurich, CH-8092 Zurich e-mail: {camenisch, stadler}@inf.ethz.ch
Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2015
Payment systems Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2015 Outline 1. Card payment 2. (Anonymous digital cash) 3. Bitcoin 2 CARD PAYMENT 3 Bank cards Credit or debit card
Credit card: permits consumers to purchase items while deferring payment
General Payment Systems Cash: portable, no authentication, instant purchasing power, allows for micropayments, no transaction fee for using it, anonymous But Easily stolen, no float time, can t easily
Crittografia e sicurezza delle reti. Digital signatures- DSA
Crittografia e sicurezza delle reti Digital signatures- DSA Signatures vs. MACs Suppose parties A and B share the secret key K. Then M, MAC K (M) convinces A that indeed M originated with B. But in case
Easy Casino Profits. Congratulations!!
Easy Casino Profits The Easy Way To Beat The Online Casinos Everytime! www.easycasinoprofits.com Disclaimer The authors of this ebook do not promote illegal, underage gambling or gambling to those living
Decision Making under Uncertainty
6.825 Techniques in Artificial Intelligence Decision Making under Uncertainty How to make one decision in the face of uncertainty Lecture 19 1 In the next two lectures, we ll look at the question of how
Payment systems. Tuomas Aura T-110.4206 Information security technology. Aalto University, autumn 2012
Payment systems Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2012 Outline 1. Money transfer 2. Card payments 3. Anonymous payments 2 MONEY TRANSFER 3 Common payment systems
Question: What is the probability that a five-card poker hand contains a flush, that is, five cards of the same suit?
ECS20 Discrete Mathematics Quarter: Spring 2007 Instructor: John Steinberger Assistant: Sophie Engle (prepared by Sophie Engle) Homework 8 Hints Due Wednesday June 6 th 2007 Section 6.1 #16 What is the
Improved Online/Offline Signature Schemes
Improved Online/Offline Signature Schemes Adi Shamir and Yael Tauman Applied Math. Dept. The Weizmann Institute of Science Rehovot 76100, Israel {shamir,tauman}@wisdom.weizmann.ac.il Abstract. The notion
What is an annuity? The basics Part 1 of 8
What is an annuity? The basics Part 1 of 8 You may be considering an annuity, and, if that s the case, it is important that know what an annuity is and isn t. Basically, an annuity is a contract with an
Public Key Cryptography: RSA and Lots of Number Theory
Public Key Cryptography: RSA and Lots of Number Theory Public vs. Private-Key Cryptography We have just discussed traditional symmetric cryptography: Uses a single key shared between sender and receiver
BANKING CHARGES. April 2016
BANKING CHARGES April 2016 Contents Your guide to our charges 1 Current account fees 2 Overdrafts 5 Our Control Option 9 Examples Unplanned Overdraft Fees 11 Debit card and Cashpoint card charges 13 Other
Comparing and Contrasting Micro-payment Models for Content Sharing in P2P Networks
Comparing and Contrasting Micro-payment Models for Content Sharing in P2P Networks Xiaoling Dai 1, Kaylash Chaudhary 2 and John Grundy 3 School of Computing Information and Mathematics Science The University
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
APS Gateway New Merchant Set-up
APS Gateway New Merchant Set-up 2014 American Payment Solutions. All rights reserved Page 1 Prior to building the APS-Gateway you will retrieve Information for the build: 1) Pull up the merchants account
Public Key Cryptography and RSA. Review: Number Theory Basics
Public Key Cryptography and RSA Murat Kantarcioglu Based on Prof. Ninghui Li s Slides Review: Number Theory Basics Definition An integer n > 1 is called a prime number if its positive divisors are 1 and
Merchant Account Glossary of Terms
Merchant Account Glossary of Terms From offshore merchant accounts to the truth behind free merchant accounts, get answers to some of the most common and frequently asked questions. If you cannot find
Probability. Section 9. Probability. Probability of A = Number of outcomes for which A happens Total number of outcomes (sample space)
Probability Section 9 Probability Probability of A = Number of outcomes for which A happens Total number of outcomes (sample space) In this section we summarise the key issues in the basic probability
Electronic Payment Systems on Open Computer Networks: A Survey
Electronic Payment Systems on Open Computer Networks: A Survey Working paper Thomi Pilioura Abstract The extraordinary growth of international interconnected computer networks and the pervasive trend of
DEVELOPMENT OF CERTIFICATE LESS DIGITAL SIGNATURE SCHEME & ITS APPLICATION IN E-CASH SYSTEM
DEVELOPMENT OF CERTIFICATE LESS DIGITAL SIGNATURE SCHEME & ITS APPLICATION IN E-CASH SYSTEM A Thesis is submitted in partial fulfilment of the requirements for the degree of Bachelor of Technology In Computer
VOCABULARY INVESTING Student Worksheet
Vocabulary Worksheet Page 1 Name Period VOCABULARY INVESTING Student Worksheet PRIMARY VOCABULARY 1. Savings: 2. Investments: 3. Investing: 4. Risk: 5. Return: 6. Liquidity: 7. Stocks: 8. Bonds: 9. Mutual
Distributed Public Key Infrastructure via the Blockchain. Sean Pearl [email protected] April 28, 2015
Distributed Public Key Infrastructure via the Blockchain Sean Pearl [email protected] April 28, 2015 Overview Motivation: Electronic Money Example TTP: PayPal Bitcoin (BTC) Background Structure Other
Security Arguments for Digital Signatures and Blind Signatures
Journal of Cryptology, Volume 13, Number 3. Pages 361 396, Springer-Verlag, 2000. 2000 International Association for Cryptologic Research Security Arguments for Digital Signatures and Blind Signatures
Chapter 16: law of averages
Chapter 16: law of averages Context................................................................... 2 Law of averages 3 Coin tossing experiment......................................................
Cashier s Cash Handling Procedures. Revised 7/1/2013
Cashier s Cash Handling Procedures Revised 7/1/2013 1 Appendix A Cashiers Handbook Sec. 1: Why Your Job Is Important As a cashier your primary responsibility is the proper handling of the money received
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
How To Pay With Cash Or Credit Card (For Women)
Electronic Payment Systems Speaker: Jerry Gao Ph.D. San Jose State University email: [email protected] URL: http://www.engr.sjsu.edu/gaojerry Sept, 2000 Topic: Online Payment Protocols and Systems
2004 Solutions Ga lois Contest (Grade 10)
Canadian Mathematics Competition An activity of The Centre for Education in Ma thematics and Computing, University of W aterloo, Wa terloo, Ontario 2004 Solutions Ga lois Contest (Grade 10) 2004 Waterloo
THE WINNING ROULETTE SYSTEM.
THE WINNING ROULETTE SYSTEM. Please note that all information is provided as is and no guarantees are given whatsoever as to the amount of profit you will make if you use this system. Neither the seller
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
Integration Guide Last Revision: July 2004
Last Revision: July 2004 PayPal Integration Guide 2004 PayPal, Inc. All Rights Reserved. PayPal and the PayPal logo are registered trademarks of PayPal, Inc. Designated trademarks and brands are the property
An Electronic Voting System Based On Blind Signature Protocol
CSMR, VOL. 1, NO. 1 (2011) An Electronic Voting System Based On Blind Signature Protocol Marius Ion, Ionuţ Posea University POLITEHNICA of Bucharest Faculty of Automatic Control and Computers, Computer
ECON 102 Spring 2014 Homework 3 Due March 26, 2014
ECON 102 Spring 2014 Homework 3 Due March 26, 2014 1. For this problem, you need to download data about the country Badgerstan from the website: https://mywebspace.wisc.edu/mmorey/web/102data.xls The file
Local 804 Pension Plan
Local 804 Pension Plan A guide to your pension plan benefits Union Benefit Plans Services Contact Contact us If you have any questions about the plan, please contact the plan administrator: Union Benefit
Price Discrimination and Two Part Tariff
Sloan School of Management 15.010/15.011 Massachusetts Institute of Technology RECITATION NOTES #6 Price Discrimination and Two Part Tariff Friday - October 29, 2004 OUTLINE OF TODAY S RECITATION 1. Conditions
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg
Outline CSc 466/566 Computer Security 8 : Cryptography Digital Signatures Version: 2012/02/27 16:07:05 Department of Computer Science University of Arizona [email protected] Copyright c 2012 Christian
WHAT YOU SHOULD KNOW ABOUT MERGING YOUR PRACTICE
WHAT YOU SHOULD KNOW ABOUT MERGING YOUR PRACTICE One night at dinner with his friend and colleague John, Bruce looks at him and says, we are both successful, good friends, cover for each other and trust
Your home loan what the banks don't tell you
Your home loan what the banks don't tell you Our homes are the biggest purchases we make, and the home loan you choose can make a significant difference to your ongoing mortgage costs. Mortgage brokers
1 SRS Advanced Customer Loyalty
1 SRS Advanced Customer Loyalty SRS Release 2 has the capability to execute offers for targeted customers and / or items with a rules-based logic (quantity and value brackets, item combinations etc.) and
Sample Questions for Mastery #5
Name: Class: Date: Sample Questions for Mastery #5 Multiple Choice Identify the choice that best completes the statement or answers the question.. For which of the following binomial experiments could
Promoting society and local authority lotteries
Promoting society and local authority lotteries Advice for society and local authority lotteries which require a licence or registration September 2014 1 Introduction 1.1 Lotteries are illegal unless they
RSA Encryption. Tom Davis [email protected] http://www.geometer.org/mathcircles October 10, 2003
RSA Encryption Tom Davis [email protected] http://www.geometer.org/mathcircles October 10, 2003 1 Public Key Cryptography One of the biggest problems in cryptography is the distribution of keys.
Payment Systems. Birgit Pfitzmann
UNIVERSITÄT DES SAARLANDES FACHBEREICH 14, INFORMATIK Payment Systems (Ch. 17 of Course Material Security ) Birgit Pfitzmann Dept. of Computer Science Saarland University [email protected] Version
ELECTRONIC COMMERCE WORKED EXAMPLES
MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.
Efficient construction of vote-tags to allow open objection to the tally in electronic elections
Information Processing Letters 75 (2000) 211 215 Efficient construction of vote-tags to allow open objection to the tally in electronic elections Andreu Riera a,,joseprifà b, Joan Borrell b a isoco, Intelligent
Mobile Electronic Payments
Chapter 7 Mobile Electronic Payments 7.1 Rationale and Motivation Mobile electronic payments are rapidly becoming a reality. There is no doubt that users of mobile phones are willing and even asking to
UNION BANK UK PLC CURRENT ACCOUNTS KEY FEATURES
UNION BANK UK PLC CURRENT ACCOUNTS KEY FEATURES Version 3 February 2016 This document sets out the key features of our Current Accounts for personal and business customers. You should read it carefully
An Education in Merchant Processing
An Education in Merchant Processing Presented by: Michael Mintz COO - AMG Payment Solutions Today s Agenda Introduction and Background Important Industry Terms The Electronic Payment Process Interchange
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Strong Encryption for Public Key Management through SSL
Strong Encryption for Public Key Management through SSL CH.SUSHMA, D.NAVANEETHA 1,2 Assistant Professor, Information Technology, Bhoj Reddy Engineering College For Women, Hyderabad, India Abstract: Public-key
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it
