A Secure Electronic Transaction Payment Protocol Design and Implementation
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 5
Abstract
Electronic payment is the very important step of the electronic business system, and its security must be ensured. SSL/TLS and SET are two widely discussed means of securing online credit card payments. Because of implementation issues, SET has not really been adopted by e-commerce participants, whereas, despite the fact that it does not address all security issues, SSL/TLS is commonly used for Internet e-commerce security. The three-domain (3D) security schemes, including 3-D Secure and 3D SET have recently been proposed as ways of improving ecommerce transaction security. Based on our research about SSL, SET, 3D security schemes and the requirements of electronic payment, we designed a secure and efficient E-Payment protocol. The new protocol offers an extra layer of protection for cardholders and merchants. Customers are asked to enter an additional password after checkout completion to verify they are truly the cardholder, the authentication is done directly between the cardholder and card issuer using the issuer security certificate and without involving the third party (Visa, MasterCard).
Authors and Affiliations
Houssam Ismaili, Hanane Houmani, Hicham Madroumi
Energy Harvesting for Remote Wireless Sensor Network Nodes
Wireless Sensor Network (WSN) technology is widely used for controlling and monitoring purposes. Advancement accomplished in the past era in wireless communications and microsystems have allowed the change of minor degre...
WHITE - DONKEY: Unmanned Aerial Vehicle for searching missing people
Searching for a missing person is not an easy task to accomplish,so over the years search methods have been developed, the problem is that the methods currently available have certain limitations and these limitations ar...
Secure user Authentication and File Transfer in Wireless Sensor Network using Improved AES Algorithm
The WSN technology is a highly efficient and effective way of gathering highly sensitive information and is often deployed in mission-critical applications, which makes the security of its data transmission of vital sign...
Overview of Technical Elements of Liver Segmentation
Liver diseases are life-threatening, it’s important to detect it tumor in early stages. So, for tumor detection Segmentation of the liver is a first and significant stride. Segmentation of the liver is a yet difficult un...
Route Optimization in Network Mobility
NEtwork MObility (NEMO) controls mobility of a number of mobile nodes in a comprehensive way using one or more mobile routers. To choose a route optimization scheme, it is very important to have a quantitative comparison...