1,852 Hits in 9.6 sec

A model to authenticate requests for online banking transactions

Saad M. Darwish, Ahmed M. Hassan
2012 Alexandria Engineering Journal  
Towards this purpose, this paper presents a modified model to authenticate clients for online banking transactions through utilizing Identity-Based mediated RSA(IB-mRSA) technique in conjunction with the  ...  To maintain the clients trust and confidence in the security of their online banking services; financial institutions must identify how attackers compromise accounts and develop methods to protect them  ...  If there is no error, the banking system allows the client to perform its online transactions. In this case, no signature storing is required for the signer to prove the server's cheating.  ... 
doi:10.1016/j.aej.2012.02.005 fatcat:lusxj3dugrdwfe7ypefnpyx6cm

Formalism, Functionalism, and Understanding the Law of Secured Transactions

Michael Bridge, Roderick A. Macdonald, Ralph L Simmonds, Catherine Walsh
1999 Social Science Research Network  
for the bailee's creditors, and in particular the bailee's inventory financier.  ...  This is so whether it is for all purposes, as in the case of conditional sales and analogous postponed title-transfer transactions, or for the more limited purposes of perfection and priority, as in the  ...  Instalment sales and financial leases, for example, would automatically become ordinary sales with a hypothec back in favour of the seller, regardless of the intention of the parties to them.  ... 
doi:10.2139/ssrn.2732687 fatcat:accgdgwuunc2fancfoxjrhdwcu

Evaluating Criminal Transactional Methods in Cyberspace as Understood in an International Context

R.V. Gundur, Michael Levi, Volkan Topalli, Marie Ouellet, Maria Stolyarova, Lennon Yao-Chung Chang, Diego Domínguez Mejía
2021 CrimRxiv  
Acknowledgements This work was supported by the UK Home Office through a National Cyber Security Programme research grant. Research assistance was provided by Tessa Cole and David Flint.  ...  Much of what we know about illicit markets online comes from studies using data from online markets across the darknet and clearnet. For instance, res  ...  Payments processing companies in these countries are critical components of the online financial transaction ecology and their status as corporate entities adds a layer of complexity to implementing strategies  ... 
doi:10.21428/cb6ab371.5f335e6f fatcat:vmrt7shntreqbg2z5mgysr5anq

Transactions on Maritime Science (ToMS) - Volume 1, 2012

:None, Universitätsbibliothek Braunschweig
2013 Transactions on Maritime Science  
The right to re-arrest or to arrest multiple vessels arises only when: -the security already provided is inadequate (in the case of re-arrests, the security can never exceed the value of the vessel in  ...  in the form of financial support, grants, equipment or all of these.  ...  the other findings presented in the relevant literature; and (c) assessment of the outcome's significance for further research.  ... 
doi:10.24355/dbbs.084-201303151339-0 fatcat:zykc4sche5f5jp7hjocvqdekei

The Lawyer's Cryptionary: A Resource for Talking to Clients About Crypto-Transactions

Carol R. Goforth
2018 Social Science Research Network  
and accepted as a medium of exchange in the country of issuance-but it does not have legal tender status in any jurisdiction. 398 While the I.R.S. stated that Virtual Currency does not have legal status  ...  For example, in the Ripple case discussed supra note 457, FinCEN suggested that when an issuer sells a token (XRP in the Ripple case) in a transaction that involves money transmission, it requires the  ...  community," for example in online games, on social media, or to purchase virtual goods or prizes in loyalty programs. 413 They note that currently, these original uses are generally exempted from Virtual  ... 
doi:10.2139/ssrn.3211010 fatcat:5yaadlo3wvemlk7zuy7dhuj2n4

Chapter 8. Intermediated Securities and Private International Law [chapter]

Changmin Chun
2012 Cross-border Transactions of Intermediated Securities  
In spite of the innovative development of intermediated systems, legal regimes for the systems have not kept up with the development of the systems.  ...  In this regard, this thesis first attempts to research substantive laws for intermediated systems in the United States, the United Kingdom, Canada, Japan and Korea.  ...  The Hunter case has been followed in Re Harvard Securities ([1997] As with the current intermediated systems in Korea and Germany, the old legal scheme in Japan was a custody system of securities certificates  ... 
doi:10.1007/978-3-642-27853-2_9 fatcat:wgmcqmwkmjdppptcbpurferkqm

Trends and Implications of Mobile and Online FinTech

Sunghyuck Hong, Div. of Information Communication, Baekseok University, KOREA, Sanghee Park, Lopez-Benitez Noe
2017 International journal of emerging multidisciplinary research  
Background/Objectives: With the advent of the FinTech era, which is an IT technology-based financial service, the service has been transformed into a service emphasizing user-friendly convenience, and  ...  Even if we provide innovative services, if we can not provide reliable service and do not get customer's trust, Findings: we will not only lose customers but also result in the decline of brand value.  ...  ACKNOWLEDGMENT This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIP) (NRF-2017R1A2B1003394)  ... 
doi:10.22662/ijemr.2017.1.1.043 fatcat:itn476z35bampcxmbpxbqgfnmy

"Fair Value" as an Avoidable Rule of Corporate Law: Minority Discounts in Conflict Transactions

John C. Coates
1999 University of Pennsylvania law review  
any discount for minority status").  ...  In a subsequent case, In re Olivetti Underwood Corp., 246 A.2d 800, 804-05 (Del.  ...  Practitioners would develop and refine techniques for arriving at appropriate adjustments, and a body of case law would develop to assist practitioners in this process.  ... 
doi:10.2307/3312725 fatcat:ntrkkwev3bblxjn6z3rag7bn2i

User-aided reader revocation in PKI-based RFID systems*

Rishab Nithyanand, Gene Tsudik, Ersin Uzun, Dimitris Gritzalis
2011 Journal of Computer Security  
In this paper, we argue that one of the prominent challenges is how to handle revocation and expiration checking of RFID reader certificates.  ...  In this context, public key certificates form the cornerstone of the overall system security.  ...  Acknowledgments: The authors are grateful to Bruno Crispo, Markus Ullman and the anonymous reviewers of ESORICS 2010 for their valuable comments on the preliminary version of this paper.  ... 
doi:10.3233/jcs-2011-0435 fatcat:h5phzfubzba6deodtozr3nugby

CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain [article]

Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar
2018 arXiv   pre-print
All TLS certificates, their revocation status, entire revocation process, and trusted CA management are conducted in the CertLedger.  ...  TLS clients in the CertLedger also do not require to make certificate validation and store the trusted CA certificates anymore.  ...  Blockchain-based Certificate and Revocation adequate solution in case both online and offline keys Transparency are compromised.  ... 
arXiv:1806.03914v2 fatcat:jcsbujoy5nbbze5ae7uhp45n7m

The Legal Force of Electronic Signatures in Online Mortgage Registration

Zainuddin Zainuddin, Rahmat Ramadhani
2021 Jurnal Penelitian Hukum De Jure  
The legal force of electronic signatures in online mortgage registration activities is an important subject to study.  ...  The research method used is normative juridical legal research that focused on two problems, namely; How is the legal force of electronic signatures in online mortgage registration?  ...  Legal Force of Electronic Signatures in Online Mortgage Registration The law is the basis for various implementations, one of which is for orderly administration and legal certainty of the status of mortgages  ... 
doi:10.30641/dejure.2021.v21.243-252 fatcat:lpwklqsmq5dxxlzz7vcmncsm2u

Usability of Display-Equipped RFID Tags for Security Purposes [chapter]

Alfred Kobsa, Rishab Nithyanand, Gene Tsudik, Ersin Uzun
2011 Lecture Notes in Computer Science  
in financial transactions or identification are usually attended by a human user (namely the owner).  ...  current method for revocation status verification.  ...  Acknowledgements The authors are grateful to NXP Semiconductors, especially to Thomas Suwald and Arne Reuter, for providing us with the display-equipped tags used in our studies.  ... 
doi:10.1007/978-3-642-23822-2_24 fatcat:abmyzefdenhifj2fqqr6hbwuzq

Cert'eM: Certification System Based on Electronic Mail Service Structure [chapter]

Javier Lopez, Antonio Mana, Juan J. Ortega
1999 Lecture Notes in Computer Science  
The system, developed and tested at the University of Malaga, was recently selected by RedIRIS, the National Research and Academic Network in Spain, to provide the public key service for its secure electronic  ...  This paper introduces a new infrastructure design, Cert'eM, a key management and certification system that is based on the structure of the electronic mail service and on the principle of near-certification  ...  The key check message is used in this case.  ... 
doi:10.1007/3-540-46701-7_9 fatcat:ivppbkjrybemdlg5ysojhal2he

A Blockchain based PKI Validation System based on Rare Events Management

Maurizio Talamo, Franco Arcieri, Andrea Dimitri, Christian H. Schunck
2020 Future Internet  
Public key infrastructures (PKIs) are the cornerstone for the security of the communication layer of online services relying on certificate-based authentication, such as e-commerce, e-government, online  ...  In this implementation we retain the full functionality around X.509 certificates, i.e., for the triad (server name, server address, X.509 server certificate), and demonstrate a mechanism for obtaining  ...  Acknowledgments: We would like to thank Silvio Casagrande of the Inuit Foundation Security Lab for his technical support and for the availability of the hardware devices used during the experiments.  ... 
doi:10.3390/fi12020040 fatcat:4cnzmhopijedzpcijy73lbk7gu

Consumer Privacy Choices, Informed Consent, and Baseline Protections to Facilitate Market Transactions in the Cloud

Jay P. Kesan, Carol M. Hayes, Masooda Bashir
2012 Social Science Research Network  
As part of this work, we analyzed and categorized the terms of TOS agreements and privacy policies of several major cloud services to aid in our assessment of the state of user privacy in the cloud.  ...  So many of our daily activities now take place "in the cloud," where we use our devices to tap into massive networks that span the globe.  ...  within the suspect's home. 341 doctrine's effect in lower federal courts Fourth Amendment cases often focus on the need for a warrant, the issuance of which requires a finding of probable cause by a  ... 
doi:10.2139/ssrn.2042638 fatcat:2i2bqo6r2be63ltmqvkeyp7tyq
« Previous Showing results 1 — 15 out of 1,852 results