wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

security requirements for safe e-payment

profile
Suraj OP
Aug 28, 2022
1 Like
0 Discussions
75 Reads

Secure Electronic Transaction (SET) is a communications protocol standard for securing credit card transactions over networks, specifically, the Internet. SET was not itself a payment system, but rather a set of security protocols and formats that enabled users to employ the existing credit card payment infrastructure on an open network in a secure fashion. However, it failed to gain attraction in the market. Visa now promotes the 3-D Secure scheme.

 

Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet. It was supported initially by Mastercard, Visa, Microsoft, Netscape, and others. With SET, a user is given an electronic wallet (digital certificate) and a transaction is conducted and verified using a combination of digital certificates and digital signatures among the purchaser, a merchant, and the purchaser's bank in a way that ensures privacy and confidentiality


Comments ()


Sign in

Read Next

Technical Challenges and Directions for Digital Forensics

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

Virtual Machine

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Memory management and virtual memory

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

Disk cache

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

How Schools Can Reduce Exam Stress in Students?

Blog banner

Bots and Cyber Security

Blog banner

5 Things I As A Dentist Would Never Do (And What You Can Learn From It)

Blog banner

Threads

Blog banner

What is process

Blog banner

Power of words

Blog banner

Remote Work in 2026

Blog banner

Virtual memory in os

Blog banner

Virus

Blog banner

Deadlock and Starvation

Blog banner

Optimization of operating system design

Blog banner

Deadlock in Operating System

Blog banner

Predictive Analysis - Ek Overview

Blog banner

Blog on health and fitness

Blog banner

Have You Explored India Yet?

Blog banner

Modern Operating System

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

INTRODUCTION

Blog banner

A buffer overflow

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Concurrency and memory

Blog banner

Career v/s Job : Choose your passion

Blog banner

How India made the GIS its Own, and its Use in Infrastructural Developments

Blog banner

Memory Management

Blog banner

child Labour

Blog banner

Linux Threads:

Blog banner

Memory Management in Operating System

Blog banner

Hello World

Blog banner

From Websites To Super Apps For Digital User Experience

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Eating Well With Meal Maharaj on Busy Workdays Without Cooking

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

Business-to-Business

Blog banner