A Review of Secure Authentication based e-Payment Protocol
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 3
Abstract
The growth of e-commerce platform is increasing rapidly and possesses a higher level of hazard compared to standard applications as well as it requires a more prominent level of safety.Additionally, the transaction and their data about clients are enormously sensitive, security production and privacy is exceptionally crucial. Consequently, the confirmation is generally vital towards security necessities as well as prevents the data from stolen and unauthorized person over the transaction of e-payment. At the same time, privacy strategies are essential to address the client data security. Because of this, the data protection and security ought to be viewed as a central part of e-business framework plan. Particularly enormous consideration is given to cash exchanges assurance. In the past decades, various methods were created to permit secure cash transaction using e-payment frameworks. This study will review and discuss the e-payment scheme. It uses various encryption algorithms and methods to accomplish data integrity, privacy, non-repudiation and authentication.
Authors and Affiliations
B. Ratnakanth, P. S. Avadhani
Smart Transportation Application using Global Positioning System
Significant increase is noticed in the utilization of mobile applications for different purposes in the past decade. These applications can improve any individual’s way of life in many aspects such as communication, coll...
Android Platform Malware Analysis
Mobile devices have evolved from simple devices, which are used for a phone call and SMS messages to smartphone devices that can run third party applications. Nowadays, malicious software, which is also known as malware,...
Assessment of High and Low Rate Protocol-based Attacks on Ethernet Networks
The Internet and Web have significantly transformed the world’s communication system. The capability of the Internet to instantly access information at anytime from anywhere has brought benefit for a wide variety of area...
MHealth for Decision Making Support: A Case Study of EHealth in the Public Sector
This paper seeks to explore factors that determine the acceptance of the MHealth application patients. The research relied on (UTAUT2) Unified Theory of Acceptance and Use of Technology to assess the level of acceptance...
An Adaptive CAD System to Detect Microcalcification in Compressed Mammogram Images
Microcalcifications (MC) in mammogram images are an early sign for breast cancer and their early detection is vital to improve its prognosis. Since MC appears as small dot in the mammogram image with size less than 1 mm...