Skip to Main Content
Cyber Security in Parallel and Distributed Computing
book

Cyber Security in Parallel and Distributed Computing

by Dac-Nhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Jyotir Moy Chatterjee, Manju Khari
April 2019
Intermediate to advanced content levelIntermediate to advanced
294 pages
9h 31m
English
Wiley-Scrivener
Content preview from Cyber Security in Parallel and Distributed Computing

CHAPTER 16MAPPING OF E-WALLETS WITH FEATURES

Alisha Sikri1, Surjeet Dalal1, N.P Singh2, Dac-Nhuong Le3

1 Department of Computer Science & Engineering, SRM University, Sonepat, Haryana, India

2 MDI, Gurugram

3 Haiphong University, Haiphong, Vietnam

Email: profsurjeetdalal@gmail.com, Nhuongld@dhhp.edu.vn

Abstract

This chapter includes various types of models operating in the e-commerce/e-business domains in India. In addition, the chapter also presents the mapping of e-wallets and its features. It is observed that the features such as digital only, text based etc are common to all types of wallets and the features like one touch, CoF etc are specific to open wallets only. This chapter tries to give a brief insight of the various technological, operational, legal and also security features available in different types of e-Wallets. It can also be concluded from the paper that all the three wallets have the same security features which includes: Anti-fraud, 3D SET or SSL, P2P, data encryption and one-time password (OTP).

Keywords: e-Commerce, e-Wallets, OTP, security

16.1 Introduction

16.1.1 e-Wallet

E-wallet can be defined as a type of electronic card which can be used for transactions made online through a computer or a Smartphone. It can also be said that its utility is same as that of a credit or debit card. An E-wallet must be linked with the individual’s bank account for the purpose of making payments [59].

The mobile wallet, which can also be called as m-Wallet, digital ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Peter Thermos, Ari Takanen

Publisher Resources

ISBN: 9781119488057Purchase book