Secure Auction Bidding Mobile Environment through Randomized Alphanumeric Cipher Algorithm

نویسندگان

  • Sudhakar Kumar Singh
  • Hariom Kumar
چکیده

Mobile Auction Bidding is a developing mechanism that may widely used by GPRS enabled mobile around the world. Many dependable models existing in internet enabled platform. The proposed Auction Bidding Mobile application is basically based on Japanese auction, Double auction and English auction. Making the business model trustworthy, security is being provided by RAC (Randomized Alphanumeric Cipher) Algorithm. The developed Mobile application has a strong process direction, in contrast to traditional cryptographic approaches, composed of functional module and the best security analysis, in terms of computational time and effective environment over the network. The infrastructure collects location evidences about the buyer authenticity and the behavior can be used in the future to profile bidders in order to detect frauds.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless Network

The existing secure e-auction schemes are shown to be too costly for users using mobile devices in wireless network as they heavily depend on costly asymmetric cipher. A new secure e-auction efficient enough for devices with low computation capability and limited communication bandwidth is designed in this paper. Most of its operations are symmetric cipher computations and the only asymmetric c...

متن کامل

Probabilistic GENCOs Bidding Strategy in Restructured Two-Side Auction Power Markets

As a matter of course, power market uncertainties escalation is by product of power industry restructure on one hand and the unrivalled penetration of renewable energies on the other. Generally, the decision making process in such an uncertain environment faces with different risks. In addition, the performance of real power markets is very close to oligopoly markets, in which, some market play...

متن کامل

Multi-agent Security Architecture for a Sharia Compliant E-auction

Electronic auction has introduced new processes in the way auction is conducted which require investigation to ensure compliancy to Sharia (Islamic principles that are based on Qur’an and Sunnah) rules. The use of mobile software agent in electronic auction marketplaces adds ubiquity power to the bidders. In particular it allows agents to quicker respond to local changes in auction marketplaces...

متن کامل

A New Framework for Scalable Secure Block Cipher Generation using Color Substitution and Permutation on Characters, Numbers, Images and Diagrams

The aim of our research is to develop a new framework for secure block cipher generation using color substitution and permutations on alphanumeric letters, symbols, images, diagrams or any kind of text. To transfer the keys from source to destination we have used RSA public key algorithm and for encryption / decryption of the information, we have used our invented „play color substitution‟ algo...

متن کامل

A Secure and Synchronized Cloud Ecosystem for Students Academics and Professional Records

Cloud computing refers to computing with a focus of virtualized computer networks or resources and application services by improving the utilization of data centre and data resources. In the existing system, it has been analyzed that the risks and availability of student’s academic records and information are very likely to be centralized, static in nature and one time use only. The proposed sy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012