A Review of Secure Authentication based e-Payment Protocol

Abstract

The growth of e-commerce platform is increasing rapidly and possesses a higher level of hazard compared to standard applications as well as it requires a more prominent level of safety.Additionally, the transaction and their data about clients are enormously sensitive, security production and privacy is exceptionally crucial. Consequently, the confirmation is generally vital towards security necessities as well as prevents the data from stolen and unauthorized person over the transaction of e-payment. At the same time, privacy strategies are essential to address the client data security. Because of this, the data protection and security ought to be viewed as a central part of e-business framework plan. Particularly enormous consideration is given to cash exchanges assurance. In the past decades, various methods were created to permit secure cash transaction using e-payment frameworks. This study will review and discuss the e-payment scheme. It uses various encryption algorithms and methods to accomplish data integrity, privacy, non-repudiation and authentication.

Authors and Affiliations

B. Ratnakanth, P. S. Avadhani

Keywords

Related Articles

Proactive Intention-based Safety through Human Location Anticipation in HRI Workspace

The safety involved in Human-Robot Interaction (HRI) is an important issue. This is the key point for the increase or decrease in HRI activity. A novel solution concerning the safety of HRI is proposed. The solution cons...

PRIVACY-PRESERVING CLUSTERING USING REPRESENTATIVES OVER ARBITRARILY PARTITIONED DATA

The challenge in privacy-preserving data mining is avoiding the invasion of personal data privacy. Secure computa- tion provides a solution to this problem. With the development of this technique, fully homomorphic encry...

A Robust Hash Function Using Cross-Coupled Chaotic Maps with Absolute-Valued Sinusoidal Nonlinearity

This paper presents a compact and effective chaos-based keyed hash function implemented by a cross-coupled topology of chaotic maps, which employs absolute-value of sinusoidal nonlinearity, and offers robust chaotic regi...

Analysis of Software Tools for Longitudinal Studies in Psychology

Longitudinal studies allow to access the review of causal hypotheses directly. It means that they make possible causal relation between the order of impacts (i.e. life events, educational effects, etc.) and the consequen...

Sensitivity Analysis of Fourier Transformation Spectrometer: FTS Against Observation Noise on Retrievals of Carbon Dioxide and Methane

Sensitivity analysis of Fourier Transformation Spectrometer: FTS against observation noise on retrievals of carbon dioxide and methane is conducted. Through experiments with real observed data and additive noise, it is f...

Download PDF file
  • EP ID EP249623
  • DOI 10.14569/IJACSA.2017.080323
  • Views 88
  • Downloads 0

How To Cite

B. Ratnakanth, P. S. Avadhani (2017). A Review of Secure Authentication based e-Payment Protocol. International Journal of Advanced Computer Science & Applications, 8(3), 150-158. https://europub.co.uk/articles/-A-249623