Countering security threats in inter-agent communication for electronic payment

Pao Yue-kong Library Electronic Theses Database

Countering security threats in inter-agent communication for electronic payment


Author: Lee, Yiu-wah Patrick
Title: Countering security threats in inter-agent communication for electronic payment
Degree: M.Sc.
Year: 2001
Subject: Electronic funds transfers -- Security measures
Hong Kong Polytechnic University -- Dissertations
Department: Multi-disciplinary Studies
Dept. of Computing
Pages: ix, 185 leaves : ill. ; 30 cm
Language: English
InnoPac Record:
Abstract: This paper presents an agent-based secure payment protocol that protects merchants and customers to exchange information. The difference between the prototype and other payment systems is that this prototype uses different cryptography algorithms that depend on the message's importance and its urgency. Also, this prototype adds another level of security to protect both merchants and customers. Further, this prototype employs an adaptive waiting message time. The use of changing cryptography algorithms or key sizes allow a faster message exchanging rate for urgent messages and a more secure message for those important messages. The additional security level pinpoints on some issues of the weakness of an opened network. Through the use of varying secret key size and increasing security levels, users are relieved of the task of exchanging information in an unreliable opened network environment. The adaptive waiting time feature prevents the transaction from aborting and restarting. Detailed expositions of varying cryptography algorithms, increasing security levels and waiting message dynamically, together with customer agents, merchant agents, and payment agents and how they interoperate are given in this paper.

Files in this item

Files Size Format
b15995872.pdf 4.781Mb PDF
Copyright Undertaking
As a bona fide Library user, I declare that:
  1. I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
  2. I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
  3. I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.
By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.


Quick Search


More Information