oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Role of Multiple Encryption in Secure Electronic Transaction  [PDF]
Himanshu Gupta,Vinod Kumar Sharma
International Journal of Network Security & Its Applications , 2011,
Abstract: Security of electronic transaction over insecure communication channel is a challenging task that includes many critical areas as secure communication channel, strong data encryption technique and trusted third party to maintain the electronic database. The conventional methods of encryption in Secure Electronic Transaction can only maintain the data security. The confidential information of customer could be accessed by the unauthorized user for malicious purpose. Therefore, it is necessary to apply effective encryption methods to enhance data security as well as authentication of data communication.The multiple encryption technique provides sufficient security for electronic transactions over wireless network. In this research paper, the needs of multiple encryption technique in Secure Electronic Transaction are proposed to enhance the security of confidential data. This technique increases the data security in such a manner that unauthorized user can not access any part of information over wireless network as internet.
A Data Mining Technique for a Secure Electronic Payment Transaction  [cached]
Vipin Saxena,N.M.P. Verma,Ajay Pratap
International Journal of Economics and Finance , 2010, DOI: 10.5539/ijef.v2n4p12
Abstract: Due to the evolution of the Electronic Learning (E-Learning), one can easily get desired information on computer or mobile system connected through Internet. Currently, E-Learning materials are easily accessible on the desktop computer system, but, in future, most of the information shall also be available on small digital devices like Mobile, PDA, etc. Most of the E-Learning materials are paid and customer has to pay entire amount through credit/debit card system. Therefore, it is very important to study about the security of the credit/debit card numbers. The present paper is an attempt in this direction and a security technique is presented to secure the credit/debit card numbers supplied over the Internet to access the E-Learning materials or any kind of purchase through Internet. A well known method i.e. Data Cube Technique is used to design the security model of the credit/debit card system. The major objective of this paper is to design a practical electronic payment protocol which is the safest and most secured mode of transaction. This technique may reduce fake transactions which are above 20% at the global level, al beit, it shows a declining trend in the recent past.
A Model of a Secure Multi-Party Transaction Protocol
L. Josephine Mary,S.P. Rajagopalan
Asian Journal of Information Technology , 2012,
Abstract: Multi-party signing and encapsulation of messages (transactions/documents) that support multiple asynchronous signers and multiple recipients. There must be some mechanisms and protocols to create and distribute protected transactions/documents between participants with flexible verification of such transactions/documents.The main objectives of our new model of a Multi-party transaction protocol to support for secure creation, distribution, verification and different legal assurance levels of signatures of multi-party (sequential and parallel) processing of transactions between multiple signers and verifiers. Therefore, it may be used for protection of various electronic transactions or documents exchanged between multiple participants.
Secure Web Financial Transaction Methods and Smart Authentication with a Focus on Mobile Devices
Computer Science and Engineering , 2012, DOI: 10.5923/j.computer.20120206.02
Abstract: In the preceding few years, new form of security threats has appeared to alter the confidential data between the user and the navigation program’s security mechanism. Man-In-The-Browser (“MITB”) and Man-In-The-Middle (“MITM”) are new form of Internet intimidations, typically a Trojan horse program; interpolate itself between the user and the navigation program like Internet Explorer or Firefox. They take over user access to the bank’s web site despite of the sound and emphatic authentication method. In the current scenario of security threats extra up-to-the-minute protections are required to avoid security breach of financial data transaction on web. These attacks emphasize the need for financial organizations to securely authenticate users and ensure the integrity of web transactions in the face of a growing threat environment. In this paper we analyze the Man In the Browser and Man In the Middle attacks and propose a solution based upon Digitally signing a transaction and using the mobile phones as a software token for Digital Signature code generation which pioneers an avenue of carrying out secure authentication from a mobile device to verify an authentic user to carry out financial transactions in a secure way on the WWW.
Secure Web Transaction with Anonymous Mobile Agent over Internet
WANG ChangJie,ZHANG FangGuo,WANG YuMinNational Key Laboratory on ISN,Xidian University,Xi''''an,PR China CAIS Laboratory,Information,Communications University,Korea,
王常杰
,张方国,王育民

计算机科学技术学报 , 2003,
Abstract: A major problem of mobile agents is their apparent inability to authenticate transactions in hostile environments. In this paper, a new secure anonymous mobile agent scheme is proposed for the prevention of agent tempering without compromising the mobility or autonomy of the agent. In the scheme, a mobile agent can produce valid signature on website's bid (it means to transact a contact with the web site) on behalf of its customer, without revealing the customer's real private key. In addition, the anonymity of the customer is also achieved when its agent transacts with the websites. Furthermore, the customer who issues a malicious agent or denies the transaction can be identified and detected by Agent Management Center (AMC). Therefore, the scheme is practical in the future electronic commerce over Internet.
ROI Based Double Encryption Approach for Secure Transaction of Medical Images  [PDF]
VRATESH KUMAR KUSHWAHA,K. ANUSUDHA
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering , 2013,
Abstract: The main focus is on enabling, supporting process in the health care industry for implementing a secure, robust and privacy complaint system for the safe distribution and use of medical image. In this paper, a new method that combines image encryption and watermarking technique for safe transaction of medical image is proposed. This method is based on selecting the ROI in the image as the watermark. This portion is encrypted by linear feedback shift register based stream ciphering which is again encrypted by the key generated by Diffie Hellman Algorithm. The encrypted ROI is embedded into the medical image by Spread spectrum technique. The proposed approach proves to be highly secure as two keys are used for encryption and the secret message is spreaded throughout the Medical image.
A Fair Payment Protocol for Cascading P2P Transaction  [cached]
Yichun Liu,Yinghong Liang,Yuping Hu
Journal of Networks , 2011, DOI: 10.4304/jnw.6.9.1313-1320
Abstract: As an emerging decentralized technology, peer- to-peer architecture arises as a new model for distributed computing and transaction, consequently there is a need for a scheme to incorporate payment services in this environment to enable electronic payment via peer-to-peer systems. In this paper, a transferable token is proposed for peer-to-peer payment system, which can float from a peer to another peer. When this kind of token is used, the fraud such as double spending can be found out but the broker need not be involved online in the payment. The optimistic payment protocol for both the basic payment and the cascading payment are presented. The disputes which might occur are analyzed and handling solution is proposed. The arbitrator need not be involved unless disputes have occurs. The optimistic payment scheme is efficient, practical and suitable for peer-to-peer transaction.
Secure E-Commerce Protocol  [PDF]
Khalid Haseeb, Muhammad Arshad, Shoukat Ali, Shazia Yasin
International Journal of Computer Science and Security , 2011,
Abstract: E-commerce has presented a new way of doing business all over the world using internet.Organizations have changed their way of doing business from a traditional approach to embrace ecommerceprocesses. As individuals and businesses increase information sharing, a concernregarding the exchange of money securely and conveniently over the internet increases. Therefore,security is a necessity in an e-commerce transaction. The purpose of this paper is to present atoken based Secure E-commerce Protocol. The purpose of this paper is to present a paradigm thatis capable of satisfying security objectives by using token based security mechanism.
Biometrics Identity Authentication in Secure Electronic Transactions
Deepu Saini,Dr. Vijay Singh Rathore
International Journal of Computer Science and Management Studies , 2012,
Abstract: There are so many ways by which a person can be identified, but authentication of a person by biometric methods is assumed to be more secure. There are many reasons behind this e.g. in this world each person is having different biometric features, even thetwins in this world having different biometrics features. In electronic transactions, biometric method is used from very early days but now a day’s it is supposed to be the best and secure method for electronic transactions. In this paper the concepts regarding biometric identity authentication are explained.
Fraudulent Electronic transaction detection using KDA Model  [PDF]
M. Vadoodparast,A. Razak Hamdan,Hafiz
Computer Science , 2015,
Abstract: Clustering analysis and Datamining methodologies were applied to the problem of identifying illegal and fraud transactions. The researchers independently developed model and software using data provided by a bank and using Rapidminer modeling tool. The research objectives are to propose dynamic model and mechanism to cover fraud detection system limitations. KDA model as proposed model can detect 68.75% of fraudulent transactions with online dynamic modeling and 81.25% in offline mode and the Fraud Detection System & Decision Support System. Software propose a good supporting procedure to detect fraudulent transaction dynamically.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.