A Novel Protocol For Enhancing The Security Of Electronic Transaction Using Gsm Authentication
In fully developing the so-called information society, the use of new technologies for commercial transaction by electronic means and without the traditional paper support is increasingly common. This gives rise to the advantages of higher speed and lower costs in carrying out business activities, a...
| Main Authors: | Abu Bakar, Kamalrulnizam, Mahamoud, Abdirizak Omar, M. Azmi, Zafril Rizal |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit UTM Press
2006
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/3286/ http://eprints.utm.my/3286/1/094_Kamarulnizam_D06.pdf |
Similar Items
GSM security: problems and solutions
by: Saeed, Rashid Abdelhaleem, et al.
Published: (2011)
by: Saeed, Rashid Abdelhaleem, et al.
Published: (2011)
Perbandingan Prestasi Antara Message Passing Interface Java (Mpijava) Dan Java Object Passing Interface (Jopi)
by: M.Azmi, Zafril Rizal, et al.
Published: (2006)
by: M.Azmi, Zafril Rizal, et al.
Published: (2006)
Securing electronic transactions via payment gateways: a systematic review
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
by: Mohammed, Lawan Ahmed
Published: (2004)
by: Mohammed, Lawan Ahmed
Published: (2004)
E-commerce solution for electronic tendering system using secure electronic transaction / Mazlina Abdul Majid
by: Mazlina , Abdul Majid
Published: (2004)
by: Mazlina , Abdul Majid
Published: (2004)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
GSM car security system
by: Mohd Azwan, Ramlan
Published: (2012)
by: Mohd Azwan, Ramlan
Published: (2012)
Security and performance enhancement of authentication protocols in heterogeneous wireless networks
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
An enhancement of authentication and energy efficient clustering protocol for wireless sensor network / Ahmed Abdulhadi Jasim
by: Ahmed Abdulhadi , Jasim
Published: (2021)
by: Ahmed Abdulhadi , Jasim
Published: (2021)
An Authentication Method for Secure Internet Transaction Using Smart Card and Secure Coprocessor
by: Ayad, Mustafa Abdsalam
Published: (2002)
by: Ayad, Mustafa Abdsalam
Published: (2002)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Secure annihilation of out-of-band authorization for
online transactions
by: Hussain, Sabahat, et al.
Published: (2018)
by: Hussain, Sabahat, et al.
Published: (2018)
Smart Home Security Using Facial Authentication
by: Rakshitha, M.V., et al.
Published: (2024)
by: Rakshitha, M.V., et al.
Published: (2024)
Security Management Model for Mobile Databases Transaction Management
by: Ziyad. T., Abdul-Mehdi, et al.
Published: (2008)
by: Ziyad. T., Abdul-Mehdi, et al.
Published: (2008)
Door Access System via Fingerprint with GSM (ReSMART)
by: Muhamad Hafizuddin, Afiq Anuar, et al.
Published: (2016)
by: Muhamad Hafizuddin, Afiq Anuar, et al.
Published: (2016)
A Secured Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Enhancing Security Protocol For Voip Communication Using Modified Vector Quantization
by: Jaafar, Mohd Yazid Mohd
Published: (2013)
by: Jaafar, Mohd Yazid Mohd
Published: (2013)
Web based agent for transaction of mercantile-security measures / Yan Wee Jing
by: Yan , Wee Jing
Published: (2001)
by: Yan , Wee Jing
Published: (2001)
Combinatorial Rules Approach to Improve Priority Rules Scheduler in Grid Computing Environment
by: Zafril Rizal, M Azmi, et al.
Published: (2012)
by: Zafril Rizal, M Azmi, et al.
Published: (2012)
A security enhanced timestamp-based password authentication scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
E-saman system using GSM technology
by: Muhammad Ridhwan, Ismail
Published: (2014)
by: Muhammad Ridhwan, Ismail
Published: (2014)
GSM - based communication protocol for vehicle immobilizer system
by: Aris, Ishak
Published: (2005)
by: Aris, Ishak
Published: (2005)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
Analyzing and Enhancing Data Management for the E-Library Transaction System
by: Marlindawati, ., et al.
Published: (2024)
by: Marlindawati, ., et al.
Published: (2024)
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
by: Khalid, Roszelinda
Published: (2018)
by: Khalid, Roszelinda
Published: (2018)
Digital security locking system – USB based GSM security system
by: Chai, Chong Yi
Published: (2011)
by: Chai, Chong Yi
Published: (2011)
Multimodality to improve Security and Privacy in Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
Simulation : authentication system for tracking staff and document in security room / Haireeza Abdul Rashid
by: Abdul Rashid, Haireeza
Published: (2006)
by: Abdul Rashid, Haireeza
Published: (2006)
Enhancing Security in Mobile IPv6 with Private Key-Based Binding Update Protocol / Hero Modares
by: Modares, Hero
Published: (2013)
by: Modares, Hero
Published: (2013)
Security guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002)
by: Ibrahim, Subariah, et al.
Published: (2002)
GSM-based notification system for electronic pigeon hole
by: Abd Wahab, Mohd Helmy, et al.
Published: (2010)
by: Abd Wahab, Mohd Helmy, et al.
Published: (2010)
Multimodality to improve Security and Privacy in Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
Secure And Effective Image Authentication And Copyright Protection Using Integer Wavelet Transform
by: Ng, Ching Onn
Published: (2023)
by: Ng, Ching Onn
Published: (2023)
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
Similar Items
-
GSM security: problems and solutions
by: Saeed, Rashid Abdelhaleem, et al.
Published: (2011) -
Perbandingan Prestasi Antara Message Passing Interface Java (Mpijava) Dan Java Object Passing Interface (Jopi)
by: M.Azmi, Zafril Rizal, et al.
Published: (2006) -
Securing electronic transactions via payment gateways: a systematic review
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017) -
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005) -
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)