secure e transaction



Next Generation Secure Computing: Biometric in Secure E transaction
free download

To establish identity of an individual is becoming critical in our heavy interconnected society. The need for reliable user authentication techniques has increased heightened concerns about security and rapid developments in networking, communication, and mobility

Biometrics in Secure e Transaction
free download

In the present day word, online shopping using WAP enabled mobile phone has widely come into use. Credit cards serve as the currency during e -business and e -Shopping. As technology has advanced in the negative side also hackers steal, misuse credit card

On Designing a Secure E -Commerce Transaction Management System A UML Based Approach
free download

E -commerce gained popularity as a sophisticated transaction system for buying and selling of products and services efficiently through Internet. Due to lack of privacy and security, customers are unwilling to participate in E -commerce transaction system. To combat such

Multimodal Biometric System in Secure e Transaction in Smart Phone
free download

Now a day, e -commerce sites are very popular. Online shopping using wap enabled mobile phone has widely come into use. Debit and credit cards are used for secure etransaction. As the technology developed thief are also very smart, they stolen our detail from wap and use

A Framework to Create a Certificate for e -Commerce Secure Transaction Protocol
free download

The development of e -commerce requires security to win the confidence of its stakeholders. Among the common protocols to establish safe financial transactions, Secure Electronic Transaction (SET) protocol has more security providing a safe protocol of payments at the

Secure End-to-End Architecture for E -commerce Security-Oriented Transaction
free download

E -commerce (business-to-consumer electronic commerce), one form of which is Web-based shopping, is defined as electronic-based economic transactions conducted between individual consumers and organizations. While this form of ecommerce is forecasted to grow

A comparative study of secure electronic transaction mechanisms for e -commerce
free download

It is mandatory how to proceed with the transaction of on-line ordering and, in the meantime, to obtain proper protection of A cryptographic key generation scheme for multilevel data security
free download

In 1982, and Taylor proposed an elegant solution to rhe partially ordered multilevel key distribution problem, using a cryptographic approach. Since then, continuing research has been conducred to try to realize and simplify their scheme. Generally speaking, there are

Towards achieving data security with the cloud computing adoption framework.
free download

Offering real-time data security for petabytes of data is important for Cloud Computing. A recent survey on cloud security states that the security of users data has the highest priority as well as concern. We believe this can only be able to achieve with an approach that is

Data security model for cloud computing
free download

With the development of cloud computing, Data security becomes more and more important in cloud computing. This paper analyses the basic problem of cloud computing data security . With the analysis of HDFS architecture, we get the data security requirement of cloud

Data security in cloud computing with elliptic curve cryptography
free download

Cloud computing is one of todays hottest research areas due to its ability to reduce costs associated with computing while increasing scalability and flexibility for computing services. Cloud computing is Internet based computing due to shared resources, software and the protection of data from accidental or malicious modification, destruction, or disclosure (FIPS); the science and study of methods of protecting data in computer and communications systems against unauthorized disclosure, transfer, delay, modifications, or

Privacy and Data Security Risks in Cloud Computing.
free download

In recent years, cloud computing has emerged as one of the fastest-growing segments of the information technology industry. The ability to leverage economies of scale, geographic distribution,

Robust data security for cloud while using third party auditor
free download

Cloud computing has been envisioned as the next-generation technology of IT industries. The Cloud is a platform where data owner remotely store their data in the cloud to enjoy the high quality applications and services. The client or data owner send their data to data

Enhancing data security using video steganography
free download

Information security has become the area of concern as a result of widespread use of communication medium over the internet. This paper focuses on the data security approach when combined with encryption and steganographic techniques for secret communication
. Currently, there are three ways for secure electronic payment mechanism of credit card: Secure Socket Layer (SSL), Secure Electronic





FREE IEEE PAPER