List of Journals    /    Call For Papers    /    Subscriptions    /    Login
 
 
 
 
 SEARCH
By Author By Title
 
 
ABOUT CSC
 About CSC Journals
 CSC Journals Objectives
 List of Journals
 CALL FOR PAPERS
 Call For Papers CFP
 Special Issue CFP
AUTHOR GUIDELINES
 Submission Guidelines
 Peer Review Process
 Helpful Hints For Getting Published
 Plagiarism Policies
 Abstracting & Indexing
 Open Access Policy
 Submit Manuscript
 FOR REVIEWERS
 Reviewer Guidelines
 FOR EDITORIAL
 Editor Guidelines
 Join Us As Editor
 Launch Special Issue
 Suggest New Journal
 CSC LIBRARY
 Browse CSC Library
 Open Access Policy
  SERVICES
 Conference Partnership Program (CPP)
 Abstracting & Indexing
 SUBSCRIPTIONS
 Subscriptions
 Discounted Packages
 Archival Subscriptions
 How to Subscribe
 Librarians
 Subscriptions Agents
 Order Form
 DOWNLOADS
 
 
 
 
Secure E-payment Protocol
Full text
 PDF(85.4KB)
Source 
International Journal of Security (IJS)
Table of Contents
Download Complete Issue    PDF(633.5KB)
Volume:  3    Issue:  5
Pages:  85-92
Publication Date:   November 2009
ISSN (Online): 1985-2320
Pages 
85 - 92
Author(s)  
 
Published Date   
30-11-2009 
Publisher 
CSC Journals, Kuala Lumpur, Malaysia
ADDITIONAL INFORMATION
Keywords   Abstract   References   Cited by   Related Articles   Collaborative Colleague
 
KEYWORDS:   Cryptography, Computer Security, Communications and Data Security 
 
 
This Manuscript is indexed in the following databases/websites:-
1. Directory of Open Access Journals (DOAJ)
2. Scribd
3. PDFCAST
4. Docstoc
5. WorldCat
6. ScientificCommons
7. CiteSeerX
8. Google Scholar
9. refSeek
10. Bielefeld Academic Search Engine (BASE)
11. Academic Index
12. ResearchGATE
13. iSEEK
14. Socol@r
 
 
The vast spreading of information in the last decade has led to great development in e-commerce. For instance, e-trade and e-bank are two main Internet services that implement e-transaction from anyplace in the world. This helps merchant and bank to ease the financial transaction process and to give user friendly services at any time. However, the cost of workers and communications falls down considerably while the cost of trusted authority and protecting information is increased. E-payment is now one of the most central research areas in e-commerce, mainly regarding online and offline payment scenarios. In this paper, we will discuss an important e-payment protocol namely Kim and Lee scheme examine its advantages and delimitations, which encourages the author to develop more efficient scheme that keeping all characteristics intact without concession of the security robustness of the protocol. The suggest protocol employs the idea of public key encryption scheme using the thought of hash chain. We will compare the proposed protocol with Kim and Lee protocol and demonstrate that the proposed protocol offers more security and efficiency, which makes the protocol workable for real world services. 
 
 
 
1 C Wang, C Chang and C Lin, "A new micro-payment system using general pay-word chain. Electronic Commerce", Research Journal, 2(1-2): 159-168, 2002
2 Y Mu, K Nguyen and V Varadharajan, "A fair electronic cash scheme", In Proceeding of the International Symposium in Electronic Commerce, LNCS 2040, Springer-Verlag, pp. 20–32, 2001.
3 N Someren, "The practical problems of implementing Micro mint", In proceeding of the International Conference of Financial Cryptography, LNCS 2339, Springer-Verlag, pp. 41-50, 2001
4 N Someren, A Odlyzko, R Rivest, T Jones and D Scot, "Does anyone really need micropayments", In proceeding of the International Conference of Financial Cryptography, LNCS 2742, Springer-Verlag, pp. 69-76, 2003.
5 S Yen, L Ho and C Huang, "Internet micro-payment based on unbalanced one-way binary tree", In Proceeding the International Conference of Cryptec'99, 155-162, 1999.
6 S Kim and W Lee, “A Pay-word-based micro-payment protocol supporting multiple payments”, In Proceeding of the International Conference on Computer Communications and Networks, pp. 609-612, 2003
7 D Chaum, Fiat and M Naor, "Untraceable electronic cash", In Proceeding Advances in Cryptology, LNCS 403, Springer-Verlag, pp. 319-327, 1988.
8 S Glassman, M Manasse, M Abadi, P Gauthier and P Sobalvarro, "The Millicent protocol for inexpensive electronic commerce", In Proceeding of the International World Wide Web Conference, pp. 603–618, O'Reilly, 1995.
9 R Rivest, "Electronic lottery tickets as micropayments", In Proceeding of the International Conference of Financial Cryptography, LNCS 1318, Springer-Verlag, pp. 307–314, 1997
10 E Foo and C Boyd, "A payment scheme using vouchers", In Proceeding of the International Conference of Financial Cryptography, LNCS 1465, Springer-Verlag, pp. 103-121, 1998.
11 Baddeley M, "Using e-cash in the new economy: An economic analysis of micro-payment systems", Journal of Electronic Commerce Research, 5 (4), 2004
12 J Hubaux, and L Buttyan, "A micro-payment scheme encouraging collaboration in multi-hop cellular networks", In Proceeding of Financial Cryptography, LNCS 2742, Springer-Verlag, pp. 15–33, 2003.
13 Koblitz N, "Elliptic Curve Cryptosystems", Mathematics of Computation, 48(2), 203-209, 1987.
14 H Chien, J Jan and Y Tseng, "RSA-based partially blind signature with low computation", In Proceeding of the International Conference in Parallel and Distributed Systems, pp. 385–389, USA, 2001.
15 Matthew N. Anyanwu, Lih-Yuan Deng & Dipankar Dasgupta, “Design of Cryptographically Strong Generator by Transforming Linearly Generated Sequences”, International Journal of Computer Science and Security, (IJCSS) Volume (3): Issue (3), 2009
16 Anil Kapil and Sanjeev Rana, Identity-Based Key Management in MANETs using Public Key Cryptography, International Journal of Security (IJS), Volume (3) : Issue (1), 2009
17 Ankur Agarwal, System-Level Modeling of a Network-on-Chip, International Journal of Computer Science and Security, (IJCSS) Volume (3): Issue (3), 2009
 
 
 
 
 
 
 
 
Sattar J Aboud : Colleagues  
 
 
 
  Untitled Document
 
Copyrights (c) 2012 Computer Science Journals. All rights reserved.
Best viewed at 1152 x 864 resolution. Microsoft Internet Explorer.
 
  
 
Copyrights & Usage: Articles published by CSC Journals are Open Access. Permission to copy and distribute any other content, images, animation and other parts of this website is prohibited. CSC Journals has the rights to take action against individual/group if they are found victim of copying these parts of the website.