StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Payword, Millicent, and MicroMint - which is the best - Essay Example

Cite this document
Summary
Customers buy scripts from the brooker, containing unique serial number for making several payments. Being based on electronic coupons, it operates as Casino gaming chips (Ellis 1997, p. 47). The…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.7% of users find it useful
Payword, Millicent, and MicroMint - which is the best
Read Text Preview

Extract of sample "Payword, Millicent, and MicroMint - which is the best"

Computer Sciences and Information Technology By: Payword, Millicent, and MicroMint - Which is the Best Lecturer’s Date1. Comparing the Payment Methods1.1. Desirable Properties of Millicent SystemMilicent can not be used without a virtual wallet integrated in the web brower. Customers buy scripts from the brooker, containing unique serial number for making several payments. Being based on electronic coupons, it operates as Casino gaming chips (Ellis 1997, p. 47). The main advantage of milicent is the reduction of costs.1.2.

Desirable Properties of Payword MicroPayment SystemPay word micropayment has a number of advantages, including Transaction Security, reduced costs and simplicity. In terms of security, pay word micropayment system prevents forgery and double payment. It reduces operational cost by using offline brokers (Wayner 1996, p.39). Payword micropayment is easy to use as long as the user has created an account with a broker. Pay word micropayment system however breaches the application of anonymity whereby vendors obtain the personal information of the users for verification.

Vendors also obtain the personal information of the users.1.3. Desirable Properties of Micro Mint SystemThe MicroMint requires heavy initial investment before it begins to operate. According to Rivest and Shamir (1996, p. 36), Micromint system is only profitable when there are many users. It experiences a double-spending issue, because one user can use one coin to make payments to more than one vendor. This cannot be detected until the transactions are confirmed with the broker, and tracing all the users of the particular coin.

According to Gwenn (2004, p. 52), the security of MicroMint is applied by changing coins frequently to prevent the hacker from braking into the system. This is an additional cost of operation. 2. Selecting the BestFrom the methods of operation of the three methods, the best choice is payword micropayment method. Even though the Micromint and Millicent methods are successful, payword micropayment is advantageous owing to its security, reduced cost and prevention of double spending.ReferencesEllis C, 1997, Evaluation of Micropayment Schemes, HP Labs Technical Reports, p. 47.Gwenn B, 2004, Online Micro-Payments: Has the Time Come?

Bank Systems & Technology, p. 52.Wayner, P 1996, Digital Cash: Commerce on the Net. Academic Press, p.39.Rivest, R and Shamir, A, 1996, PayWord and MicroMint: Two simple Micropayment schemes, p.36.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Payword, Millicent, and MicroMint - which is the best Essay”, n.d.)
Payword, Millicent, and MicroMint - which is the best Essay. Retrieved from https://studentshare.org/information-technology/1678443-payword-millicent-and-micromint-which-is-the-best
(Payword, Millicent, and MicroMint - Which Is the Best Essay)
Payword, Millicent, and MicroMint - Which Is the Best Essay. https://studentshare.org/information-technology/1678443-payword-millicent-and-micromint-which-is-the-best.
“Payword, Millicent, and MicroMint - Which Is the Best Essay”, n.d. https://studentshare.org/information-technology/1678443-payword-millicent-and-micromint-which-is-the-best.
  • Cited: 0 times

CHECK THESE SAMPLES OF Payword, Millicent, and MicroMint - which is the best

Purpose of the Super Keyword

In most of the languages, keyword refers to reserved words, which classify a syntactic form.... However, other languages have a liberal approach, which allows redefinition of keywords for purposes.... Keywords refer to identifiers or symbols which stand for functions or variables.... As a result, the super keyword in java indicates the super class of the classes in which the super keyword has recently been used (Leahy, 2011)....
4 Pages (1000 words) Research Paper

Major Features of Plywood

The material is made of thin sheets of wood placed in layers.... Plywood is made by placing thin sheets of wood veneer on top or beneath one or more layers… Wood veneers or plies that form the layers may be chip boards, thin sheets of wood, or fiber boards that are of medium density.... Normally, the plies are normally arranged so that the wood grains of adjacent Plywood Plywood is one engineering material that finds a lot of use in the construction industry (Muller, 2003; Chandigarh, 2001)....
1 Pages (250 words) Essay

Keyword Research for JEMSS

It entails a structured analysis of various keywords identified from the website.... The paper has analysis of the keywords and a paragraph that rounds up the findings of the research. The JEMSS website is easy to navigate and… There are arrows on the left and write that create an avenue for information relevant to what the institution offers flows across the site....
1 Pages (250 words) Essay

Password Management Protocol vulnerabilities

There are many, even in the Internet, software which can help even amateurs in this business to steal passwords.... There are many, even in the Internet, software which can help even amateurs in this business to steal passwords.... Because mechanism of the encrypting passwords is very weak and even the simplest applications can retrieve them from their register, moreover, this application has good interface and getting passwords can present problem for the hacker, because it needs physical contact with the target computer, however, there are thousands modifications of this software which have hidden interface and after the running can send all passwords on the email or FTP-server of the hacker....
2 Pages (500 words) Essay

Case of a Cocaine Delivery

With reference to the dangerous act or ‘dangerousness' requirements, Sam's delivery of cocaine is a dangerous act inherently threatening human life.... Considering the elements of the crime, cocaine dealing is a crime, usually provoking violent acts based on the nature of… In this case, the merger rule does not apply to Sam's case as the death of the victim occurred as an accident as Bobbie was firing back to scare Wayward 2E Sam's Delivery of Cocaine and Shooting at Bobbie a....
2 Pages (500 words) Essay

Micromint micropayment

The merchant only contracts with the broker during the sales of the Micro mint micropayment By: Computer Sciences and Information Technology Lecturer's How Millicent Micropayment System WorksMillicent operates as an electronic currency system referred to as scrip, which can be used to buy electronic contents from vendors.... A customer buys the scrip from at least one… The scrip is transformed from broker to vendor scrip before its usage. The millicent system operates with trusted brokers and third parties between the merchants and the clients (Manasse 2012, p....
1 Pages (250 words) Essay

Promethus and Hayward: a Comparison

The primary source of the LPG produced by the Company is methane, which it captures from stranded sources which also include landfills, sewage plants, and wastewater treatment facilities, agricultural operations as well as coal beds.... An author of this essay seeks to draw a comparison and contrast between business strategies of two companies: Prometheus and Hayward....
8 Pages (2000 words) Essay

The Process of Researching Keywords

Various social marketing experienced personnel have been very committed to building the content and the structure of the course which is then tried in the institution of project partners.... From this work, it is clear about user feedbacks which helps the company to improve in case weakness has been identified in a specific area, the concept of social marketing.... The views that are always contained in any of the article residing within JEMMS website are always user feedbacks which help the company to improve in case weakness has been identified in a specific area....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us