Ве молиме користете го овој идентификатор да го цитирате или поврзете овој запис: http://hdl.handle.net/20.500.12188/8194
DC FieldValueLanguage
dc.contributor.authorLina Lumburovskaen_US
dc.contributor.authorVesna Dimitrova,en_US
dc.contributor.authorStefan Andonoven_US
dc.contributor.authorKeti Isajloska and Jovana Dobrevaen_US
dc.contributor.authorJovana Dobrevaen_US
dc.date.accessioned2020-05-21T06:30:16Z-
dc.date.available2020-05-21T06:30:16Z-
dc.date.issued2020-05-08-
dc.identifier.urihttp://hdl.handle.net/20.500.12188/8194-
dc.description.abstractOne of the first online payment systems was eCash, which was discovered in the previous century and is still used worldwide. In this communication system, we are talking about more participants and contributors, but the main characters are the buyer and the seller. Their identity should stay anonymous and that is what this protocol can afford. Taking into consideration its advantages and disadvantages, the system works in real life centralized and decentralized systems and is spreading its usage to a higher level. Maintaining secure protocol must be obtained, so we discussed a few methods in order to achieve this property. We have also shown some basic principals for good implementation and what should be fulfilled in order to provide the best version of the eCash payment system. Basically, starting from the beginnings of eCash, we studied its implementation and design and then presented its security aspects and how this system works in eeal life examples in both centralized and decentralized systems.en_US
dc.language.isoenen_US
dc.publisherSs Cyril and Methodius University in Skopje, Faculty of Computer Science and Engineering, Republic of North Macedoniaen_US
dc.relation.ispartofseriesCIIT 2020 short papers;45-
dc.titleSecure ECash Payment Method Based on Pseudo-Random Functions in Centralized and Decentralized Systemsen_US
dc.typeProceeding articleen_US
dc.relation.conference17th International Conference on Informatics and Information Technologies - CIIT 2020en_US
item.fulltextWith Fulltext-
item.grantfulltextopen-
Appears in Collections:International Conference on Informatics and Information Technologies
Files in This Item:
File Опис SizeFormat 
CIIT2020_paper_45.pdf156.73 kBAdobe PDFThumbnail
View/Open
Прикажи едноставен запис

Page view(s)

5.161
Last Week
2
Last month
checked on 27.7.2025

Download(s)

157
checked on 27.7.2025

Google ScholarTM

Проверете


Записите во DSpace се заштитени со авторски права, со сите права задржани, освен ако не е поинаку наведено.