ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Noval Approach on Online Transaction Protocols

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.3, No. 7)

Publication Date:

Authors : ; ;

Page : 466-471

Keywords : SSL Protocol; SET Protocol; symmetric & asymmetric Methodology; Dual signatures..;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The increase of wireless devices, offering connectivity and convenience, continues to exert marvelous demands on merchants to deploy secure wireless applications including electronic commerce. Secure Socket Layer (SSL) and Transport Layer Security (TLS) is the protocol above TCP, which can protect user’s privacy when they sending data from a client side to a web server, this is an important protocol due to the expansion of Internet. In fact, it is a long way to make the SSL/TLS protocol perfectly. Although the Secure Electronic Transaction (SET) protocol offers end-to-end security for credit card transactions over a wired infrastructure, there are several factors including bandwidth requirements which make it unsuitable for wireless applications. In this paper we review a secure electronic payment system for Internet transaction. The electronic payment system is to be secure for Internet transaction participants such as Payment gateway server, Bank sever and Merchant server. The security architecture of the system is designed by using Many Security Protocols and techniques, which eliminates the fraud that occurs today with stolen credit card/debit card payment information and customer information. Electronic commerce involves the exchange of some form o f money for goods and services over the Internet but today, Internet is an insecure and unreliable media. The asymmetric key cryptosystem The confidential information of customer could be accessed by the unauthorized user for malicious purpose. Therefore, it is necessary to apply effective encryption methods to enhance data security as well as authentication of data communication. The multiple encryption technique provides sufficient security for electronic transactions over wireless network

Last modified: 2014-08-04 20:09:47