scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Secured E-commerce transactions through choatic map

TL;DR: A new algorithm for a secure e-transaction using chaos is proposed, which could be used for e-commerce, banking, and other transactions using the Internet.
Abstract: Internet has become widespread, and is used for all transactions to support client and server services. E-commerce is also one of the services to sell the goods using the Internet. E-Transaction has becomes more important, security for E-transaction is a important work because of the insecure communication channel. In this paper, we have proposed a new algorithm for a secure e-transaction using chaos.
Citations
More filters
Journal ArticleDOI
TL;DR: In this article , a secure framework integrating e-Health and cloud using Hyper Chaos-based Image Encryption is proposed for potential implementation of security over sensitive image data transmitted over the clouds, alternatively applies any one of the proposed chaos-based image encryptions and image scrambling schemes depending on the intensity and type of attack over the images shared in the cloud environment.

14 citations

Proceedings ArticleDOI
25 May 2018
TL;DR: In this article, the authors examined the acceptance and usage of e-transaction instruments by consumers of indigenous herbal remedies in the mixed residential/industrial town of Ota, Nigeria.
Abstract: Electronic forms of transaction have permeated the world and disrupted traditional payment models, generally. On other hand, global interest in indigenous herbal remedies is gaining unprecedented momentum with researchers and consumers alike, showing keener interest in the product. However, little has been said about the acceptance and application of e-transaction by culturally rooted consumers of indigenous herbal remedies in Nigeria. To fill this gap, this study examined the awareness and usage of e-transaction instruments by consumers of indigenous herbal remedies in the mixed residential/industrial town of Ota, Nigeria. Technology Acceptance Model informed the application of quantitative survey method through which a questionnaire was operated on 1,000 respondents. Results showed that in spite of strong awareness of e-transaction modes of expense, preference for cash payment for purchasing indigenous herbal remedies is preponderant among the local consumers. Fear of possible price increases occasioned by e-transaction adoption is pervasive; but the study suggested infrastructural, informational, and communication steps to erase the prejudice and midwife e-herbals in the near future.

6 citations


Cites background from "Secured E-commerce transactions thr..."

  • ...Current technological and commercial applications of electronic transactions are well espoused by [2], [3], [4], [5] as well as [6]....

    [...]

References
More filters
Book
28 Oct 1999
TL;DR: In this paper, the authors present the fundamentals of electronic commerce and its terminology, describing what it is and how it is being conducted and managed, focusing on the major opportunities, limitations, issues, and risks impacting the market place around the world as we enter the second millenium.
Abstract: From the Publisher: This book presents the fundamentals of electronic commerce and its terminology, describing what it is and how it is being conducted and managed. It also focuses on the major opportunities, limitations, issues, and risks impacting the market place around the world as we enter the second millenium. Chapter topics include retailing, consumer behavior and market research, advertisement and publishing, services, intranet and extranet application, payments, corporate strategy, public policy, and infrastructure. For anyone interested in network and Internet transactions — especially managers and professional in any functional area of the business world, and people in government, education, and health services.

2,095 citations


"Secured E-commerce transactions thr..." refers background in this paper

  • ...For e-commerce security purpose, transaction of money through the Internet make sure thatthe different alogithms are used in alltransaction process, for example the fingerprint biometric modality algorithm has focussed the importantance of it’s couple of characteristics such as the unique identity and permananence that’s able to stay unchanged over the lifetime [3]....

    [...]

  • ...Every payment method needs a security for money transaction on the Internet for their users which is considered to be an important process of the e-commerce....

    [...]

  • ...Internet has became the important marketplace in many applications....

    [...]

  • ...This has motivated the researchers to solve such problems to protect Internet users from hackers or intruders....

    [...]

  • ...People are adopting the Internet technology for their professional and personal usages such as execute their money transfer, shopping, electronic payments and many other activities over the Internet[12,13]....

    [...]

Journal ArticleDOI
TL;DR: It is possible to encrypt a message using the ergodic property of the simple low-dimensional and chaotic logistic equation, in order to transfer the trajectory from an initial condition towards an ϵ-interval inside the logistic chaotic attractor.

857 citations


"Secured E-commerce transactions thr..." refers methods in this paper

  • ...The initial condition parameters in chaotic maps are meaningful on real numbers, which is be used in the cryptographic algorithms as encryption and decryption keys [19]....

    [...]

Journal ArticleDOI
TL;DR: The proposed scheme fully preserves the privacy of the biometric data of every user, that is, the scheme does not reveal theBiometric data to anyone else, including the remote servers, through the GNY (Gong, Needham, and Yahalom) logic.
Abstract: A three-factor authentication scheme combines biometrics with passwords and smart cards to provide high-security remote authentication. Most existing schemes, however, rely on smart cards to verify biometric characteristics. The advantage of this approach is that the user's biometric data is not shared with remote server. But the disadvantage is that the remote server must trust the smart card to perform proper authentication which leads to various vulnerabilities. To achieve truly secure three-factor authentication, a method must keep the user's biometrics secret while still allowing the server to perform its own authentication. Our method achieves this. The proposed scheme fully preserves the privacy of the biometric data of every user, that is, the scheme does not reveal the biometric data to anyone else, including the remote servers. We demonstrate the completeness of the proposed scheme through the GNY (Gong, Needham, and Yahalom) logic. Furthermore, the security of our proposed scheme is proven through Bellare and Rogaway's model. As a further benefit, we point out that our method reduces the computation cost for the smart card.

158 citations


"Secured E-commerce transactions thr..." refers background in this paper

  • ..., discussed about the biometric data used as a key to encrypt, and the idea conservesthe privacy of biometric templates [7]....

    [...]

01 Jan 2012
TL;DR: This talk will present a perspective on the current state of play in the field of encryption algorithms, in particular on private key block ciphers which are widely used for bulk data and link encryption.
Abstract: This talk will present a perspective on the current state of play in the field of encryption algorithms, in particular on private key block ciphers which are widely used for bulk data and link encryption. we have initially survey some of the more popular and interesting algorithms currently in use. This paper focuses mainly on the different kinds of encryption techniques that are existing, and comparative study all the techniques together as a literature survey. Aim an extensive experimental study of implementations of various available encryption techniques. Also focuses on image encryption techniques, information encryption techniques. This study extends to the performance parameters used in encryption processes and analyzing on their security issues.

80 citations

Journal Article
TL;DR: Experimental results illustrate that the scheme is highly key sensitive and shows a good resistance against brute-force and statistical attacks.
Abstract: In this paper, a novel image encryption scheme is proposed based on combination of pixel shuffling and W7. Due to sensitivity to initial conditions, chaotic maps have a good potential for designing dynamic permutation map. So a chaotic Henon map is used to generate permutation matrix. An external secret key is used to derive the initial conditions for the chaotic map and W7 secret key. Pixel shuffling is performed via vertical and horizontal permutation. Shuffling is used to expand diffusion in the image and dissipate the high correlation among image pixels. In order to evaluate performance, the proposed algorithm was measured through a series of tests. Experimental results illustrate that the scheme is highly key sensitive and shows a good resistance against brute-force and statistical attacks.

80 citations


Additional excerpts

  • ...Some of the algorithm like choas impact date compressibility[16]....

    [...]