E-Transaction without Using Trusted Third Party Based On RSA Signature
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2014, Vol 1, Issue 2
Abstract
E transaction allows to support two parties exchange their obligation over the internet. Based on the RSA algorithm we are going to deal this protocol in this paper. In the existing or previous system , use of third party seems to increase the risk in dealing. In this paper we are going to built an independent web application by removing third party. We Are going to provide security between dealing parties.RSA –based act of finding such a solution, since the third party(court) is going to involve in the condition if and only if one of the dealing parties is cheated or the channel is misused. Furthermore the proposed system introduced new technology i.e., Trusted ETransaction if any party is cheated with the other party then whole transaction is terminated. Active Bundle which is mediator that contain private confidential data proposed system gives security and improve the performance virtual machine that contain protection rules and policies. The RSA Algorithm is used for signing and verifying identity the digital signature is the combination of private and public key. the private key plays the role of senders own signature. the senders public key plays the role copy of signature which are available to the public.
Authors and Affiliations
Prof Jadhav Abhijit . D.
Short Survey on Noise Removal systems in Video Sequences
Noise is one of the pre-processing techniques. The image noise may be termed as random variation of brightness or color information. There are various types of image noise. Modern technology provides us with useful tools...
Network Security and Cryptography
Network Security & Cryptography is a complicated and Historically only tackled by Well-trained and experienced experts. However as more and more people become “wired”, an increasing number of people need to understand th...
Encoding and Decoding information with the help of Hill Cipher
The role of cryptographic part in today‟s world is very significant. It not only secures information mathematically by mailing massage with a key but also provides confidentiality which is the most important factor in to...
Facial Expression Based Face Recognition Using Machine Learning with SVM Kernel: HMM and FDA
Face recognition is that the powerful task from the pictures that is done by a machine that is ready to determine the face of a human being. Automatic face recognition is that the still awfully acknowledged and hard to p...
Length-weight relationship and condition of Mystus cavasius (Hamilton) from lower Indus River at Thatta District, Sindh, Southern Pakistan
Mystus cavasius a Bagirid catfish is one of the commercially important fish. Paper presents the first report on any biological aspect of this important catfish. Studies on Length-weight relationship and condition factor...