International Journal of Advances in Science, Engineering and Technology(IJASEAT)
.
Follow Us On :
current issues
Volume-12,Issue-1  ( Jan, 2024 )
Past issues
  1. Volume-12,Issue-1  ( Jan, 2024 )
  2. Volume-11,Issue-4  ( Oct, 2023 )
  3. Volume-11,Issue-3  ( Jul, 2023 )
  4. Volume-11,Issue-2  ( Apr, 2023 )
  5. Volume-11,Issue-1  ( Jan, 2023 )
  6. Volume-10,Issue-4  ( Oct, 2022 )
  7. Volume-10,Issue-3  ( Jul, 2022 )
  8. Volume-10,Issue-2  ( Apr, 2022 )
  9. Volume-10,Issue-1  ( Jan, 2022 )
  10. Volume-9,Issue-4  ( Oct, 2021 )

Statistics report
Apr
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
  Journal Paper


Paper Title :
Enhancing Secure Transaction And Identity Authentication In M-Commerce

Author :K.Shanmugam, Dr.B.Vanathi

Article Citation :K.Shanmugam ,Dr.B.Vanathi , (2014 ) " Enhancing Secure Transaction And Identity Authentication In M-Commerce " , International Journal of Advances in Science, Engineering and Technology(IJASEAT) , pp. 46-50, Volume-1,Issue-3

Abstract : This study focuses on an advanced mobile security system to provide rapid and highly secure human friendly M-commerce transaction. M-commerce transaction works in multistep process. The process involves User authentication, Merchant authentication and Message authentication. M-commerce provides availability, reliability and security in transaction phases. The M –commerce phases involves multiple steps like Offering goods (O) , searching for available goods (B) , ordering the goods(O) , paying (P),delivering (D) and distributing(D). The proposed work improves security in user authentication by Wireless Application Protocol (WAP) gateway, which in turn provides end to end security using Double encryption model. In double encryption model, transfer the authentication data and product ordered using WTLS Protocol between mobile terminal and WAP gateway. TLS/SSL protocol is used to transfer data and product between WAP gateway and server. Merchant authentication is done by a third party. WTLS and TLS/SSL protocols use a message authentication code (MAC) technique to provide the data integrity

Type : Research paper

Published : Volume-1,Issue-3


DOIONLINE NO - IJASEAT-IRAJ-DOIONLINE-332   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 39
| Published on 2014-01-22
   
   
IRAJ Other Journals
IJASEAT updates
Volume-11,Issue-4 (Oct,2023)
The Conference World

JOURNAL SUPPORTED BY