Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Immune Distinctive Authentication for E-transaction through Remote Systems

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 110 - Number 13
Year of Publication: 2015
Authors:
Sudeep. V
Pradeep Freddy. A
Avinash Choudhary. A. R
10.5120/19377-1034

Sudeep.v, Pradeep Freddy. A and Avinash Choudhary. A.r. Article: Immune Distinctive Authentication for E-transaction through Remote Systems. International Journal of Computer Applications 110(13):21-24, January 2015. Full text available. BibTeX

@article{key:article,
	author = {Sudeep.v and Pradeep Freddy. A and Avinash Choudhary. A.r},
	title = {Article: Immune Distinctive Authentication for E-transaction through Remote Systems},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {110},
	number = {13},
	pages = {21-24},
	month = {January},
	note = {Full text available}
}

Abstract

Fast development in Information Communication Technology (ICT) and cellular telephone innovations empower users to perform online transactions from cell telephones/machines from anyplace, at whenever. Thus users need to oversee various online records. Thusly users key-in numerous login data to verify/access them. Consequently it is troublesome for users to oversee various online record accreditations. Presently users plan to have basic qualifications for all the online records or store them in a content document in cellular telephone and physically get to the record at whatever point they require login certifications. This is a genuine security danger for users, who are more helpless against certifications theft because of spying, shoulder surfing when they perform transactions at un-purified environment, for example, open web joint. In this paper we actualize a novel validation plan Immune Distinctive Authentication for E-Transactions Through Remote Systems (IDAERS) - Identity Based Elliptic Curve Encryption method which encourages users without breaking a sweat to work various online record transaction verification without the need to recall qualifications on cellular telephone gadget.

References

  • Olkowski, Jr and David,. J,. . Information Security Issues in E­ Commerce 1 I, SANS GlAC Security Essentials, 2001.
  • Raymond, G. Sin and Ramnath, K. Chellappa, , Personalization versus Privacy: An Empirical Examination of the Online Consumer's Dilemma, Information Technology and Management. 2005, p. 181-202.
  • Ramnath, K. Chellappa . Consumers' Trust in Electronic Commerce Transactions: The Role of Perceived Privacy and Perceived Security," http://asura. u sc. edu/ram/rcf-papers/sec­ priv. pdf, 2001.
  • Li Liu, Lei, Ming, Xiao,V, Vrbsky, Li, Chung Chih, and ,Yang, Susan. A Virtual Password Scheme to Protect Passwords. In Proceedings of the ICe. 2008, 1536-1540.
  • CISCO, Implementing Keychain Management on Cisco lOS XR Software Cisco lOS XR System Security Configuration Guide.
  • Danfeng Yao, Roberto, , Tamassia and Michael, T Goodrich, Notarized Federated Identity Management for Web Services. In: DSSec . 2006, 133.
  • R. Tamassia, D. Yao, and ,M. T. Goodrich, "Notarized Federated Identity Management for Web Services" http://www . cs. brown. edu/c gc/ stms/papers/notarizedFIM. p df, accessed July 2010.
  • Dominique, Simon, Mayer , Ion, Guinard, Iulia and. In Search of an Internet of Things Service Architecture:REST or WS-*? A Developers' Perspective. In Proceedings of MobiQuitous. 2011.
  • B S, Rajan, Adiga, Balamuralidhar, Shivraj V L, P Ravishankara, , M A, Shastry, and. Lightweight IBE Scheme for Wireless Sensor Nodes. In proceedings of IEEE ANTS 20 13(Accepted).