CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Immune Distinctive Authentication for E-transaction through Remote Systems

by Sudeep.v, Pradeep Freddy. A, Avinash Choudhary. A.r
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 110 - Number 13
Year of Publication: 2015
Authors: Sudeep.v, Pradeep Freddy. A, Avinash Choudhary. A.r
10.5120/19377-1034

Sudeep.v, Pradeep Freddy. A, Avinash Choudhary. A.r . Immune Distinctive Authentication for E-transaction through Remote Systems. International Journal of Computer Applications. 110, 13 ( January 2015), 21-24. DOI=10.5120/19377-1034

@article{ 10.5120/19377-1034,
author = { Sudeep.v, Pradeep Freddy. A, Avinash Choudhary. A.r },
title = { Immune Distinctive Authentication for E-transaction through Remote Systems },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 110 },
number = { 13 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 21-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume110/number13/19377-1034/ },
doi = { 10.5120/19377-1034 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:46:16.578441+05:30
%A Sudeep.v
%A Pradeep Freddy. A
%A Avinash Choudhary. A.r
%T Immune Distinctive Authentication for E-transaction through Remote Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 110
%N 13
%P 21-24
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Fast development in Information Communication Technology (ICT) and cellular telephone innovations empower users to perform online transactions from cell telephones/machines from anyplace, at whenever. Thus users need to oversee various online records. Thusly users key-in numerous login data to verify/access them. Consequently it is troublesome for users to oversee various online record accreditations. Presently users plan to have basic qualifications for all the online records or store them in a content document in cellular telephone and physically get to the record at whatever point they require login certifications. This is a genuine security danger for users, who are more helpless against certifications theft because of spying, shoulder surfing when they perform transactions at un-purified environment, for example, open web joint. In this paper we actualize a novel validation plan Immune Distinctive Authentication for E-Transactions Through Remote Systems (IDAERS) - Identity Based Elliptic Curve Encryption method which encourages users without breaking a sweat to work various online record transaction verification without the need to recall qualifications on cellular telephone gadget.

References
  1. Olkowski, Jr and David,. J,. . Information Security Issues in E­ Commerce 1 I, SANS GlAC Security Essentials, 2001.
  2. Raymond, G. Sin and Ramnath, K. Chellappa, , Personalization versus Privacy: An Empirical Examination of the Online Consumer's Dilemma, Information Technology and Management. 2005, p. 181-202.
  3. Ramnath, K. Chellappa . Consumers' Trust in Electronic Commerce Transactions: The Role of Perceived Privacy and Perceived Security," http://asura. u sc. edu/ram/rcf-papers/sec­ priv. pdf, 2001.
  4. Li Liu, Lei, Ming, Xiao,V, Vrbsky, Li, Chung Chih, and ,Yang, Susan. A Virtual Password Scheme to Protect Passwords. In Proceedings of the ICe. 2008, 1536-1540.
  5. CISCO, Implementing Keychain Management on Cisco lOS XR Software Cisco lOS XR System Security Configuration Guide.
  6. Danfeng Yao, Roberto, , Tamassia and Michael, T Goodrich, Notarized Federated Identity Management for Web Services. In: DSSec . 2006, 133.
  7. R. Tamassia, D. Yao, and ,M. T. Goodrich, "Notarized Federated Identity Management for Web Services" http://www . cs. brown. edu/c gc/ stms/papers/notarizedFIM. p df, accessed July 2010.
  8. Dominique, Simon, Mayer , Ion, Guinard, Iulia and. In Search of an Internet of Things Service Architecture:REST or WS-*? A Developers' Perspective. In Proceedings of MobiQuitous. 2011.
  9. B S, Rajan, Adiga, Balamuralidhar, Shivraj V L, P Ravishankara, , M A, Shastry, and. Lightweight IBE Scheme for Wireless Sensor Nodes. In proceedings of IEEE ANTS 20 13(Accepted).
Index Terms

Computer Science
Information Sciences

Keywords

E-Transactions Elliptic Curve Encryption Information Communication Technology Identity Based Remote Systems public key generator(PKG).