Reach Us +447482877761
Framework of M-Commerce using ID-Based Cryptography | OMICS International | Abstract
ISSN: 0974-7230

Journal of Computer Science & Systems Biology
Open Access

Like us on:

Our Group organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations
700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article

Framework of M-Commerce using ID-Based Cryptography

Sridhar K1*, M. Sandeep2 and D. Sagar3

1M.Tech Student, Sree Chaitanya College of Engineering, Karimnagar, India

2Asst Prof in CSE-Dept, VITS School Of Engineering and Technology, Karimnagar, India

3Assoc Prof in CSE-Dept, Sree Chaitanya College Of Engineering, Karimnagar, Indi

*Corresponding Author:
Dr. Sridhar K Student
Sree Chaitanya College of Engineering
Karimnagar, India
E-mail: [email protected]

Received date: April 25, 2011; Accepted date: July 30, 2011; Published date: July 31, 2011

Citation: Sridhar K, Sandeep M, Sagar D (2011) Framework of M-Commerce using ID-Based Cryptography. J Comput Sci Syst Biol 4:050-054. doi:10.4172/jcsb.1000076

Copyright: © 2011 Sridhar K, et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License,which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Now a day's customers are more interested in value-added mobile applications. In order to attract more customers to such mobile applications, a solid, secure and robust trading model is necessity. This paper proposes such a secure trading model named Mobile Electronic Payment (MEP) for the mobile commerce (m-commerce) over wireless mobile networks, which applies the emerging ID-based cryptography for key agreement and authentication. Our MEP attempts to ease the computational cost, reduce the memory space requirement in mobile devices, and meet the requirements for secure trading: avoidance of excessiveness and double expenditure, fairness, user ambiguity and privacy. Our design is transparent to the bearer networks and is of low deployment cost. We expect that our MEP provides a viable trading architecture model for the future mobile applications.


Recommended Conferences

16th World Congress on Structural Biology

Amsterdam, Netherlands
Share This Page