Contract Signing Protocol Based on RSA Signature
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 7
Abstract
A reasonable contract-marking convention permits two conceivably doubted equalities to trade their responsibilities to a concurred contract over the Internet in a reasonable manner, so that either each of them acquires the other's signature or neither one of the parties does. Taking into account the RSA mark conspire, another advanced contract-marking convention is proposed in this paper. Like the current RSA-based answers for the same issue, the convention is reasonable, as well as idealistic, since the trusted outsider is included just in the circumstances where one gathering is swindling or the correspondence channel is intruded. Besides, the proposed convention fulfills new property illuse freeness. That is, if the convention is executed unsuccessfully, none of the two gatherings can demonstrate the legitimacy of middle of the road results to others. This misuse free reasonable contract marking convention in view of the RSA mark gives both security and effectiveness.
Authors and Affiliations
Sheetal M Rao, Asst Prof Varsha Vaidya
Study on factors affecting Job Satisfaction, Loyalty, and Commitment among managerial staff with reference to e-Publishing organisations in ITES / BPM industry
Job satisfaction, loyalty and commitment are important attributes for employee retention. The paper investigates the factors that would affect satisfaction, loyalty and commitment amongst the managerial staff in ITES /...
Comparative Study of DPPH, ABTS and FRAP Assays for Determination of Antioxidant Activity
Three simple spectrophotometric methods: (1, 1-diphenyl-2-picrylhydrazyl) free radical scavenging activity assay (DPPH), [2,2’-azinobis(3-ethylbenzothiazoline-6-sulphonic acid)] free radical scavenging activity assay (A...
Method & Implementation of Relocalisation and Management for Smart System in WSN
during the development of a WSN, it is unknown which influences the nodes might experience, which nodes might crash and how long exactly the sensor nodes will last with available energy. Also nodes might experience high...
slugEfficient Utilization of Nodes in a Gaming Environment by Greedy Strategies in Cloud Computing
Cloud computing can be offers dynamic and a better resources are to be given to the users according to their demand basis. In the existing environments of cloud computing the load distribution between the different virt...
SRWD Technique for Security Enhancement of Audio Steganography
From the past few years with progression in era of information society and their related applications are becoming more and more popular. Attacks can occur due to system vulnerabilities or user misuse or program defects...