A Review of Secure Authentication based e-Payment Protocol
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 3
Abstract
The growth of e-commerce platform is increasing rapidly and possesses a higher level of hazard compared to standard applications as well as it requires a more prominent level of safety.Additionally, the transaction and their data about clients are enormously sensitive, security production and privacy is exceptionally crucial. Consequently, the confirmation is generally vital towards security necessities as well as prevents the data from stolen and unauthorized person over the transaction of e-payment. At the same time, privacy strategies are essential to address the client data security. Because of this, the data protection and security ought to be viewed as a central part of e-business framework plan. Particularly enormous consideration is given to cash exchanges assurance. In the past decades, various methods were created to permit secure cash transaction using e-payment frameworks. This study will review and discuss the e-payment scheme. It uses various encryption algorithms and methods to accomplish data integrity, privacy, non-repudiation and authentication.
Authors and Affiliations
B. Ratnakanth, P. S. Avadhani
Iterative Threshold Decoding Of High Rates Quasi-Cyclic OSMLD Codes
Majority logic decoding (MLD) codes are very powerful thanks to the simplicity of the decoder. Nevertheless, to find constructive families of these codes has been recognized to be a hard job. Also, the majority of known...
An Empirical Study of the Applications of Data Mining Techniques in Higher Education
Few years ago, the information flow in education field was relatively simple and the application of technology was limited. However, as we progress into a more integrated world where technology has become an integral par...
Context-Aware Mobile Application Task Offloading to the Cloud
One of the benefits of mobile cloud computing is the ability to offload mobile applications to the cloud for many reasons including performance enhancement and reduced resource consumption. This paper is concerned with o...
Thinging for Computational Thinking
This paper examines conceptual models and their application to computational thinking. Computational thinking is a fundamental skill for everybody, not just for computer scientists. It has been promoted as skills that ar...
A Novel Energy Efficient Mobility Aware MAC Protocol for Wireless Sensor Networks
Dealing with mobility at the link layer in an efficient and effective way is a formidable challenge in Wireless Sensor Networks due to recent boom in mobile applications and complex network scenarios. Most of the current...