Two Way Authentication in MITM Attack to Enhance Security of E-commerce Transactions

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authentication Approaches for E-Commerce Transactions:

Mostly we use password for Remote Authentication but Smart Cardbased scheme is very promising and practical solution to remote authentication. Over the past several years, Smart Cards have achieved a growing acceptance as a powerful tool for Security, Identification and Authorization. Smart Cards have been widely used as simple token hardware in authentication process. As the e-business is grow...

متن کامل

Enhancing E-commerce Security Using GSM Authentication

Today, e-commerce transactions are typically protected using SSL/TLS. However, there are risks in such use of SSL/TLS, notably threats arising from the fact that information is stored in clear at the end point of the communication link and the lack of user authentication. Although SSL/TLS does offer the latter, it is optional and usually omitted since users typically do not have the necessary a...

متن کامل

Efficient Primitives for Ensuring Security in E - Commerce Transactions

Park, Jung Min. Ph.D., Purdue University, August, 2003. Efficient Primitives for Ensuring Security in E-Commerce Transactions. Major Professors: Edwin K. P. Chong and Howard Jay Siegel. Fueled by the exponential growth in the number of people with access to the Internet, electronic-commerce (e-commerce) transactions via the Internet have become a major part of our economy. For a wider range of ...

متن کامل

Design of RFID Security Authentication Protocol for E-Commerce Service

As for security of RFID network, this paper has proposed a safe, effective and scalable RFID Authentication Protocol (CRFID) with cloud database as server. Firstly, the tree-structure management tag is used to achieve privacy protection, and the time complexity of RFID system in search of cloud database is reduced from O (N) to O (logN); then, the size of each subkey in keys route of the RFID t...

متن کامل

Improving Security of E- Commerce application by using Multifactor Authentication

All e-commerce environments require support for security properties such as authentication, authorization, data confidentiality, and non -repudiation. The most common method of authentication or protection against intrusion in a computer system is to use alphanumeric usernames and password. Choosing a strong password and protecting the chosen password has always been a popular topic among secur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Security and Its Applications

سال: 2015

ISSN: 1738-9976

DOI: 10.14257/ijsia.2015.9.9.23