期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
WILL '07 OPEN WALLETS? Both the government and businesses want the people to spend more-and they probably will
1
作者 LAN XINZHEN 《Beijing Review》 2007年第1期30-33,共4页
关键词 Both the government and businesses want the people to spend more-and they probably will wallets
原文传递
A modified EDAS model for comparison of mobile wallet service providers in India
2
作者 Sanjib Biswas Dragan Pamucar 《Financial Innovation》 2023年第1期1215-1245,共31页
The present paper has two-fold purposes.First,the current work provides an integrated theoretical framework to compare popular mobile wallet service providers based on users’views in the Indian context.To this end,we... The present paper has two-fold purposes.First,the current work provides an integrated theoretical framework to compare popular mobile wallet service providers based on users’views in the Indian context.To this end,we propose a new grey correlationbased Picture Fuzzy-Evaluation based on Distance from Average Solution(GCPF-EDAS)framework for the comparative analysis.We integrate the fundamental framework of the Technology Acceptance Model and Unified theory of acceptance and use of technology vis-a-vis service quality dimensions for criteria selection.For comparative ranking,we conduct our analysis under uncertain environments using picture fuzzy numbers.We find that user-friendliness,a wide variety of use,and familiarity and awareness about the products help reduce the uncertainty factors and obtain positive impressions from the users.It is seen that PhonePe(A3),Google Pay(A2),Amazon Pay(A4)and PayTM(A1)hold top positions.For validation of the result,we first compare the ranking provided by our proposed model with that derived by using picture fuzzy score based extensions of EDAS and another widely used algorithm such as The Technique for Order of Preference by Similarity to Ideal Solution.We observe a significant consistency.We then carry out rank reversal test for GCPF-EDAS model.We notice that our proposed GCPF-EDAS model does not suffers from rank reversal phenomenon.To examine the stability in the result for further validation,we carry out the sensitivity analysis by varying the differentiating coefficient and exchanging the criteria weights.We find that our proposed method provides stable result for the present case study and performs better as ranking order does not get changed significantly with the changes in the given conditions. 展开更多
关键词 Picture fuzzy Grey correlation EDAS method TOPSIS Comparison of mobile wallets
下载PDF
Blockchain Mobile Wallet with Secure Offline Transactions
3
作者 Raed Saeed Rasheed Khalil Hamdi Ateyeh Al-Shqeerat +2 位作者 Ahmed Salah Ghorab Fuad Salama AbuOwaimer Aiman Ahmed AbuSamra 《Computers, Materials & Continua》 SCIE EI 2023年第5期2905-2919,共15页
There has been an increase in the adoption of mobile payment systems worldwide in the past few years.However,poor Internet connection in rural regions continues to be an obstacle to the widespread use of such technolo... There has been an increase in the adoption of mobile payment systems worldwide in the past few years.However,poor Internet connection in rural regions continues to be an obstacle to the widespread use of such technologies.On top of that,there are significant problems with the currently available offline wallets;for instance,the payee cannot verify the number of coins received without access to the Internet.Additionally,it has been demonstrated that some existing systems are susceptible to false token generation,and some do not even permit the user to divide the offline token into smaller portions to be used as change.This paper proposes a blockchainbased wallet system that provides a secure mobile payment service even if a user cannot access a reliable Internet connection.Our approach relies on Bluetooth and digital signatures to establish and build a trust connection between the parties.The proposed solution overcomes the main limitations of existing systems that use offline transactions,such as the generation of fake offline tokens and the indivisibility of offline tokens.The user buys Offline Tokens(OTs)from a server called an Offline Token Manager(OTM)to use them later to perform offline transactions.Each mobile device must store a single,signed offline token transaction to prevent fake tokens.On the other hand,all offline transactions will be kept as a history in a particular local database.Finally,when the receiver becomes online,it will send a convert request to the OTMto change the value of the OTs to the appropriate amount in real coins.This step requires a connection to the Internet.To evaluate the effectiveness of the system,the Solidity programming language was used to develop a smart contract on the Ethereum blockchain with a backend application programming interface(API)and an android mobile application.The proposed method has an advantage over other prominent wallets. 展开更多
关键词 Mobile wallet blockchain smart contracts digital signature
下载PDF
A Key Recovery System Based on Password-Protected Secret Sharing in a Permissioned Blockchain 被引量:1
4
作者 Gyeong-Jin Ra Chang-Hyun Roh Im-Yeong Lee 《Computers, Materials & Continua》 SCIE EI 2020年第10期153-170,共18页
In today’s fourth industrial revolution,various blockchain technologies are being actively researched.A blockchain is a peer-to-peer data-sharing structure lacking central control.If a user wishes to access stored da... In today’s fourth industrial revolution,various blockchain technologies are being actively researched.A blockchain is a peer-to-peer data-sharing structure lacking central control.If a user wishes to access stored data,she/he must employ a private key to prove ownership of the data and create a transaction.If the private key is lost,blockchain data cannot be accessed.To solve such a problem,public blockchain users can recover the key using a wallet program.However,key recovery in a permissioned blockchain(PBC)has been but little studied.The PBC server is Honest-but-Curious(HBC),and should not be able to learn anything of the user;the server should simply recover and store the key.The server must also be resistant to malicious attacks.Therefore,key recovery in a PBC must satisfy various security requirements.Here,we present a password-protected secret sharing(PPSS)key recovery system,protected by a secure password from a malicious key storage server of a PBC.We describe existing key recovery schemes and our PPSS scheme. 展开更多
关键词 Password-protected secret sharing key recovery blockchain wallet security
下载PDF
Share of Wallet in FMCGs Retailing:Proposing a Conceptual Model
5
作者 Vincenzo Basile 《Chinese Business Review》 2018年第2期84-98,共15页
Recent years,the Marketing Science Institute considered marketing performance measurement(MPM)a priority in marketing research and managerial practice.Several contributions on the same topic have been proposed in lite... Recent years,the Marketing Science Institute considered marketing performance measurement(MPM)a priority in marketing research and managerial practice.Several contributions on the same topic have been proposed in literature.The ability to measure the marketing performance is considered,a cognitive gap that determined a decrease of marketing relevance within firm and organizations.Based on relevant literature on retailing and an explorative case study,it will be proposed a conceptual and pragmatic model to investigate MPM for a consumer goods retailer.The model is aimed to identify antecedents of“share of purchase”,“share of wallet”,and“share of visit”.An early test of the model has been carried out on three Italian leading chains:Superò,a master franchisee of SMA Spa(owned of 27 small supermarkets under control of the French Auchan Group),Decò-Multicedi(the Group is a multi-channel company based on network of five Ad Hoc cash&carry centers,253 Decòoutlets and three Ayoka pet shops)located in Campania Region.“U2”(the outlets label of Unes Spa,Finiper Group,operating mostly in northern Italy,with a chain of more than 190 direct and franchise supermarkets). 展开更多
关键词 MARKETING performance measurement SHARE of VISIT SHARE of PURCHASE SHARE of wallet MARKETING metrics and RETAIL INDUSTRY
下载PDF
A scalable decentralized system for fair token distribution and seamless users onboarding
6
作者 Francesco Bruschi Manuel Tumiati +2 位作者 Vincenzo Rana Mattia Bianchi Donatella Sciuto 《Blockchain(Research and Applications)》 2022年第1期40-48,共9页
Tokens are digital,transferable,and programmable assets and one of the most promising tools offered by blockchains.They could enable a wide range of applications,from down to earth to futuristic.One of the main issues... Tokens are digital,transferable,and programmable assets and one of the most promising tools offered by blockchains.They could enable a wide range of applications,from down to earth to futuristic.One of the main issues in achieving wide adoption of tokens is onboarding:main platforms require users to deal with specific tools such as wallets,transaction fees,key generation,and storage.The most common solution to offer a familiar experience to naive users are custodial intermediaries,which have the important drawback of centralizing the process,and keeping users away from the advantages of selfsovereign assets control.In this paper,we present a process for the distribution of digital tokens to end users,exploiting“physical”objects for initial distribution.The process is aimed at making the onboarding of users not yet accustomed to blockchain tools and concepts as easy as possible,in a secure and decentralized way. 展开更多
关键词 Blockchain Tokens Onboarding wallets
原文传递
Oracle数据库透明数据加密方式研究
7
作者 程敏 宋金玉 《信息安全与通信保密》 2007年第8期153-155,共3页
文中介绍了oracle 10g Release2中的透明数据加密方式,分析了它的加密机制,叙述了这种方法的加密粒度以及在数据库中的具体实现形式。
关键词 TDE加密 解密 密钥 wallet
原文传递
Your Digital Wallet
8
作者 Michael Fitzgerald 《射频世界》 2008年第3期90-91,共2页
The technology inside smart cards and highway toll-taking sys- tems is now making its way into cell phones. And, within a year or two, it could be changing how many of us get information and?do business. Near-field co... The technology inside smart cards and highway toll-taking sys- tems is now making its way into cell phones. And, within a year or two, it could be changing how many of us get information and?do business. Near-field communications (NFC) combines two established technologies: radio frequency identification (RFID) tags, 展开更多
关键词 CELL NFC Your Digital Wallet RFID
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部