ABSTRACT
Secure electronic payment system is presented in this paper. This electronic payment system is to be secure for clients such as customers and shop owners. The security architecture of the system is designed by RC5 encryption / decryption algorithm. This eliminates the fraud that occurs today with stolen credit card numbers. The symmetric key cryptosystem RC5 can protect conventional transaction data such as account numbers, amount and other information. This process can be done electronically using RC5 encryption / decryption program written by Microsoft Visual Basic 6.0. There is no danger of any data sent within the system being intercepted, and replaced. The alternative is to use the existing network, and to encrypt all data transmissions. The system with
encryption is acceptably secure, but that the level of encryption has to be stepped up, as computing power increases. Results In order to be secure the system the communication between modules is encrypted using symmetric key cryptosystem RC5. The system will use simple user name, password, user ID, user type and cipher authentication mechanism for identification, when the user first enters the system. It is the most common method of authentication in most computer system.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
CHAPTER ONE
1.0INTRODUCTION
1.1STATEMENT OF PROBLEM
1.2PURPOSE OF STUDY
1.3IMPORTANCE OF THE STUDY
1.4DEFINITION OF TERMS
DBMS - DATABASE MANAGEMENT SYSTEM
PSP - PAYMENT SERVICE PROVIDERS
1.5ASSUMPTION OF THE STUDY
CHAPTER TWO
2.0LITERATURE REVIEW
2.1CREDIT CARDS AND SMART CARDS
2.2ELECTRONIC BILL PRESENTMENT AND PAYMENT
CHAPTER THREE
3.0A LAYERED PROTOCOL MODEL.
3.2PAYMENT PROTOCOL MODELS INCLUDES THE FOLLOWING;
3.3LIST OF INTERNET PAYMENTS SCHEMES AND PROPOSALS
BANKNET ELECTRONIC BANKING SERVICE MARKET-NET
BARCLAYNET BARCLAYCARD
CAFE CAFE
E-CASH DIGICASH ANONYMOUS DIGITAL CASH
GREEN COMMERCE FIRST VIRTUAL
FBOI FIRST BANK OF INTERNET
LETSYSTEMS
CHAPTER FOUR
ï± MANUAL E-PAYMENT
4.1IMPLEMENTATION ROAD MAP
CHAPTER FIVE
5.0CONCLUSION
5.1 LIMITATION OF THE STUDY
5.2SUGGESTION FOR FURTHER STUDY
REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2012, 11). Electronic Payment System Security.. ProjectStoc.com. Retrieved 11, 2012, from https://projectstoc.com/read/289/electronic-payment-system-security
"Electronic Payment System Security." ProjectStoc.com. 11 2012. 2012. 11 2012 <https://projectstoc.com/read/289/electronic-payment-system-security>.
"Electronic Payment System Security.." ProjectStoc.com. ProjectStoc.com, 11 2012. Web. 11 2012. <https://projectstoc.com/read/289/electronic-payment-system-security>.
"Electronic Payment System Security.." ProjectStoc.com. 11, 2012. Accessed 11, 2012. https://projectstoc.com/read/289/electronic-payment-system-security.
- Related Works
- An Anti Phishing Strategy Based On Visual Similarity Assessment
- The Effects Of Computer Application In The Modern World
- Design And Implementation Of An Automated Hotel Researvation Management System Case : Zodiac Hotel Ltd
- Design And Implementation Of A Video Steganography Using Mobile Simulation
- Design And Implementation Of A Computerized Accounting System Of An Academics System (a Case Study Of Imt Enugu)
- Design And Implementation Of A Product Distribution Management System A Case Study Fo Nigeria Breweries Limited 9th Mile Corner Enugu
- Windows Multi File Search Utility
- A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu)
- Design And Implementation Of Virtual Classroom
- Shortest Nodefinder In Wireless Ad Hoc Network