A Secure Protocol for M-commerce Secure SMS Mobile Payment
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 4
Abstract
The worldwide utilization of the Internet has profoundly supplied the development of e-commerce. Technological advancement in mobile phones (e.g. Mobile phones) has likewise added to doing ecommerce by means of mobile phones (m-business). Mcommerce includes the utilization of mobile phones, for example, mobile phones in doing electronic exchanges. Applications in this area range from ordinary data utilization to high security money related electronic exchanges. Much the same as ecommerce, the security of m-business applications is basic, particularly when it includes applications that arrangement with client touchy information, In the usage, the purchaser utilizes the program to shop online of course, at the checkout he is sent to the versatile application gave and secured by the bank. The gatherings imparts through three distinctive channels (VPN burrowing, SMS informing and HTTPS) to improve the security. This convention guarantees that the purchaser basic data is never ignored the web to have the capacity to buy and in the meantime the scanning knowledge has little interference. Additionally it presents minimal overhead on the vendor and the banks to have the capacity to give such administration. To ensure the convention acts as expected, an android application was made that speaks with web servers speaking to the purchaser bank, the shipper site and vendor bank. All interchanges between the application and the purchaser bank were through VPN and SMS.
Authors and Affiliations
Sai Dharma Reddy Gudimetla| isecure payments (Android Developer), Gachibowli, Hyderabad, TG, India, Buddharaju Shanmukh Varma| Gayatri Vidya Parishad College of Engineering, Visakhapatnam, AP, India, Sai Raghukanth Reddy Gudimetla| Gayatri Vidya Parishad College of Engineering, Visakhapatnam, AP, India
Ann Based Distribution Static Compensator For Power Quality Improvement With Linear Sinusoidal Tracer Control Algorithm
In this paper an ANN based DSTATCOM is proposed for reactive power compensation, harmonics elimination, zero voltage regulation, power factor correction, neutral current compensation and unbalance caused by various l...
A Novel Attack Methods For Inferring On Certain Url’s On Twitter
Twitter is a well-known online informal organization benefit for sharing short messages (tweets) among friends. Its clients regularly utilize URL shortening administrations that give (i) a short false name of a long...
Recursive Approach to the Design of a Parallel Self Timed Adder
As innovation scales down into the lower nanometer values control, postpone region and recurrence gets to be im¬portant parameters for the examination and plan of any circuits. This short exhibits a parallel single-...
Review on Data Hiding Schemes into Multimedia Data
In this period of internet, Multimedia data security is crucial issue because there are many cases of illegal production and redistribution through the Internet. Data hiding and encryption algorithms can be used for...
Restrain On Social Networks From Conjecture Attacks
Online social networks are used by many people. These Social networks allow their members to connect bymeans of various web linkes in which the We study the problem of privacy-preservation in social networks. Now-a-d...