Research Article

Immune Distinctive Authentication for E-transaction through Remote Systems

by  Sudeep.V, Pradeep Freddy. A, Avinash Choudhary. A.R
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 110 - Issue 13
Published: January 2015
Authors: Sudeep.V, Pradeep Freddy. A, Avinash Choudhary. A.R
10.5120/19377-1034
PDF

Sudeep.V, Pradeep Freddy. A, Avinash Choudhary. A.R . Immune Distinctive Authentication for E-transaction through Remote Systems. International Journal of Computer Applications. 110, 13 (January 2015), 21-24. DOI=10.5120/19377-1034

                        @article{ 10.5120/19377-1034,
                        author  = { Sudeep.V,Pradeep Freddy. A,Avinash Choudhary. A.R },
                        title   = { Immune Distinctive Authentication for E-transaction through Remote Systems },
                        journal = { International Journal of Computer Applications },
                        year    = { 2015 },
                        volume  = { 110 },
                        number  = { 13 },
                        pages   = { 21-24 },
                        doi     = { 10.5120/19377-1034 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2015
                        %A Sudeep.V
                        %A Pradeep Freddy. A
                        %A Avinash Choudhary. A.R
                        %T Immune Distinctive Authentication for E-transaction through Remote Systems%T 
                        %J International Journal of Computer Applications
                        %V 110
                        %N 13
                        %P 21-24
                        %R 10.5120/19377-1034
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Fast development in Information Communication Technology (ICT) and cellular telephone innovations empower users to perform online transactions from cell telephones/machines from anyplace, at whenever. Thus users need to oversee various online records. Thusly users key-in numerous login data to verify/access them. Consequently it is troublesome for users to oversee various online record accreditations. Presently users plan to have basic qualifications for all the online records or store them in a content document in cellular telephone and physically get to the record at whatever point they require login certifications. This is a genuine security danger for users, who are more helpless against certifications theft because of spying, shoulder surfing when they perform transactions at un-purified environment, for example, open web joint. In this paper we actualize a novel validation plan Immune Distinctive Authentication for E-Transactions Through Remote Systems (IDAERS) - Identity Based Elliptic Curve Encryption method which encourages users without breaking a sweat to work various online record transaction verification without the need to recall qualifications on cellular telephone gadget.

References
  • Olkowski, Jr and David,. J,. . Information Security Issues in E­ Commerce 1 I, SANS GlAC Security Essentials, 2001.
  • Raymond, G. Sin and Ramnath, K. Chellappa, , Personalization versus Privacy: An Empirical Examination of the Online Consumer's Dilemma, Information Technology and Management. 2005, p. 181-202.
  • Ramnath, K. Chellappa . Consumers' Trust in Electronic Commerce Transactions: The Role of Perceived Privacy and Perceived Security," http://asura. u sc. edu/ram/rcf-papers/sec­ priv. pdf, 2001.
  • Li Liu, Lei, Ming, Xiao,V, Vrbsky, Li, Chung Chih, and ,Yang, Susan. A Virtual Password Scheme to Protect Passwords. In Proceedings of the ICe. 2008, 1536-1540.
  • CISCO, Implementing Keychain Management on Cisco lOS XR Software Cisco lOS XR System Security Configuration Guide.
  • Danfeng Yao, Roberto, , Tamassia and Michael, T Goodrich, Notarized Federated Identity Management for Web Services. In: DSSec . 2006, 133.
  • R. Tamassia, D. Yao, and ,M. T. Goodrich, "Notarized Federated Identity Management for Web Services" http://www . cs. brown. edu/c gc/ stms/papers/notarizedFIM. p df, accessed July 2010.
  • Dominique, Simon, Mayer , Ion, Guinard, Iulia and. In Search of an Internet of Things Service Architecture:REST or WS-*? A Developers' Perspective. In Proceedings of MobiQuitous. 2011.
  • B S, Rajan, Adiga, Balamuralidhar, Shivraj V L, P Ravishankara, , M A, Shastry, and. Lightweight IBE Scheme for Wireless Sensor Nodes. In proceedings of IEEE ANTS 20 13(Accepted).
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

E-Transactions Elliptic Curve Encryption Information Communication Technology Identity Based Remote Systems public key generator(PKG).

Powered by PhDFocusTM