This document proposes a new framework for secure mobile commerce (m-commerce) that combines double layer encryption, steganography, and secure XML messages transferred between a mobile terminal and server. The framework is based on J2ME/MIDP and aims to provide strong security and invisibility while maintaining high operating efficiency and compatibility with many mobile terminals. It encrypts data using an elliptic curve cryptography algorithm and hides the encrypted information in images using random least significant bit steganography before transmitting between devices.
Instant Messenger (IM) becomes one of the most popular applications in mobile technology and
communication. A lot of users around the world installed it for daily activities. Current IM found security
lacks both in authentication and encryption matters. Various IM growing today still not apply an efficient
method in authentication and encryption process, conventional security methods and client-server
architecture system have to risk too many users for attacking server such as compromising, cracking
password or PINs by Unauthorized people. Common IM services lack native encryption to protect
information being transmitted over the public network and still used high computation in the mobile
environment, this problem needs efficient security methods. Then, in public IM also found various
messages with fake users, it occurs because public IM carry out the separate system in authentication and
encryption process, strong authentication need to solve this issue in messenger environment. The
tremendous growth of mobile IM user needs efficient and secure communication way. This paper proposes
a new efficient method for securing message both in encryption and authentication within the end-to-end
model. In this research, security method proposes new algorithms based on Elliptic Curve (EC) works in
Peer to Peer (P2P) architecture than a conventional client-server model. The result shows this method
produces efficient time in authentication and encryption process while applying in a mobile environment.
Besides, it is compatible with the mobile phone which has a limitation of computation capabilities and
resources.
Residential access control system using QR code and the IoT IJECEIAES
This paper presents a residential access control system (RACs) using QR codes and the internet of things (IoT) to improve security and help house owners. The contribution of this paper is that it proposes two mechanisms in the authentication phase and the verification phase, respectively, to enhance residential access control. The main idea is using cryptography between smartphones and access control devices. The cryptography compares secret codes on the key server via the internet. The RACs can notify a user of the residential access status through the LINE application and show the statuses of devices through the network platform for the internet of everything (NETPIE) in real-time. We compare this system’s performance with that of the current access control methods in terms of security and access speed. The results show that this system has more security and has an access speed of 5.63 seconds. Moreover, this system is safer and more flexible than the comparative methods and suitable for contactless authentication.
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
With the go on the evolution of both computer and internet technology, videos, sounds, and scripts are used more and more often. It can be used in sundry techniques in ciphering and data concealing. The objective of this paper is leading to the suggestion of a new method of the combination between encryption and concealment of information so as to make it difficult to identify the transmitted datavia networks. This study has used two force secure (2FS) to encrypt the images, in other words, the SF is frequent twice on the image, to obtain powerful encryption then the concealing of the secret message is done inside the cryptography of the image has been performed using a secret key (cosine curve), and this stego-encryption image has been transformed forthe Internet of things storage in the database in IoT (data flow), when the user needs any information can be access inviaof internet of things (IoTs). The outcome of the proposed system is obtained tobe evaluated through different measures, such aspeak signal noise ratio (PSNR), mean square error (MSE), entropy,correlation coefficient, and histogram. The proposed system is good, efficient, fast, has high security, robustness, and transparency.
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...IJECEIAES
Development of prototype at data security through secret messages is needed for disguising the messages sent in smartphone chatting application, WhatsApp (WA) Chat. We propose a model to disguise a plaintext message which is first encrypted by cryptosystem to change the plaintext message to ciphertext. Plaintext or plainimage entering the smartphone system is changed into encrypted text; receiver then can read the message by using similar key with the sender. The weakness of this proposal is the message random system is not planted directly in the chatting application; therefore message removing process from cryptosystem to WA application is still needed. The strength of using this model is the messages sent will not be easily re-encrypted by hacker and can be used at client computing section.
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKINGIJNSA Journal
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and stored in special records and the second level being a typical password protection scheme. The second level is for secure access of information from the device. In the first level, encryption of the data is done using the location coordinates as key. Location Coordinates are rounded up figures of longitude and latitude information. In the second phase the password entry differs from conventional schemes. Here we have used the patterns of traditional Rangoli for specifying the password and gaining access, thus minimising the chances of data leak in hostile situations. The proposed structure would be a better trade off in comparison with the previous models which use Bio Metric authentication – a relatively costly way of
authentication.
Securing mobile cloud using finger print authenticationIJNSA Journal
Mobile cloud computing becomes part of mobile users daily life transactions. Mobile devices with Internet
capabilities have increased the use of mobile clouding computing. Due to hardware limitations in mobile
devices, these devices can't install and run applications require heavy CPU processing or extensive
memory. Cloud computing allows mobile users to synchronize their data with remote storage and utilize
applications require heavy CPU processing or extensive memory such as Microsoft Office or Adobe
Photoshop, as they run in a desktop computer.
Instant Messenger (IM) becomes one of the most popular applications in mobile technology and
communication. A lot of users around the world installed it for daily activities. Current IM found security
lacks both in authentication and encryption matters. Various IM growing today still not apply an efficient
method in authentication and encryption process, conventional security methods and client-server
architecture system have to risk too many users for attacking server such as compromising, cracking
password or PINs by Unauthorized people. Common IM services lack native encryption to protect
information being transmitted over the public network and still used high computation in the mobile
environment, this problem needs efficient security methods. Then, in public IM also found various
messages with fake users, it occurs because public IM carry out the separate system in authentication and
encryption process, strong authentication need to solve this issue in messenger environment. The
tremendous growth of mobile IM user needs efficient and secure communication way. This paper proposes
a new efficient method for securing message both in encryption and authentication within the end-to-end
model. In this research, security method proposes new algorithms based on Elliptic Curve (EC) works in
Peer to Peer (P2P) architecture than a conventional client-server model. The result shows this method
produces efficient time in authentication and encryption process while applying in a mobile environment.
Besides, it is compatible with the mobile phone which has a limitation of computation capabilities and
resources.
Residential access control system using QR code and the IoT IJECEIAES
This paper presents a residential access control system (RACs) using QR codes and the internet of things (IoT) to improve security and help house owners. The contribution of this paper is that it proposes two mechanisms in the authentication phase and the verification phase, respectively, to enhance residential access control. The main idea is using cryptography between smartphones and access control devices. The cryptography compares secret codes on the key server via the internet. The RACs can notify a user of the residential access status through the LINE application and show the statuses of devices through the network platform for the internet of everything (NETPIE) in real-time. We compare this system’s performance with that of the current access control methods in terms of security and access speed. The results show that this system has more security and has an access speed of 5.63 seconds. Moreover, this system is safer and more flexible than the comparative methods and suitable for contactless authentication.
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
With the go on the evolution of both computer and internet technology, videos, sounds, and scripts are used more and more often. It can be used in sundry techniques in ciphering and data concealing. The objective of this paper is leading to the suggestion of a new method of the combination between encryption and concealment of information so as to make it difficult to identify the transmitted datavia networks. This study has used two force secure (2FS) to encrypt the images, in other words, the SF is frequent twice on the image, to obtain powerful encryption then the concealing of the secret message is done inside the cryptography of the image has been performed using a secret key (cosine curve), and this stego-encryption image has been transformed forthe Internet of things storage in the database in IoT (data flow), when the user needs any information can be access inviaof internet of things (IoTs). The outcome of the proposed system is obtained tobe evaluated through different measures, such aspeak signal noise ratio (PSNR), mean square error (MSE), entropy,correlation coefficient, and histogram. The proposed system is good, efficient, fast, has high security, robustness, and transparency.
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...IJECEIAES
Development of prototype at data security through secret messages is needed for disguising the messages sent in smartphone chatting application, WhatsApp (WA) Chat. We propose a model to disguise a plaintext message which is first encrypted by cryptosystem to change the plaintext message to ciphertext. Plaintext or plainimage entering the smartphone system is changed into encrypted text; receiver then can read the message by using similar key with the sender. The weakness of this proposal is the message random system is not planted directly in the chatting application; therefore message removing process from cryptosystem to WA application is still needed. The strength of using this model is the messages sent will not be easily re-encrypted by hacker and can be used at client computing section.
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKINGIJNSA Journal
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and stored in special records and the second level being a typical password protection scheme. The second level is for secure access of information from the device. In the first level, encryption of the data is done using the location coordinates as key. Location Coordinates are rounded up figures of longitude and latitude information. In the second phase the password entry differs from conventional schemes. Here we have used the patterns of traditional Rangoli for specifying the password and gaining access, thus minimising the chances of data leak in hostile situations. The proposed structure would be a better trade off in comparison with the previous models which use Bio Metric authentication – a relatively costly way of
authentication.
Securing mobile cloud using finger print authenticationIJNSA Journal
Mobile cloud computing becomes part of mobile users daily life transactions. Mobile devices with Internet
capabilities have increased the use of mobile clouding computing. Due to hardware limitations in mobile
devices, these devices can't install and run applications require heavy CPU processing or extensive
memory. Cloud computing allows mobile users to synchronize their data with remote storage and utilize
applications require heavy CPU processing or extensive memory such as Microsoft Office or Adobe
Photoshop, as they run in a desktop computer.
We are providing training on IEEE 2016-17 projects for Ph.D Scalars, M.Tech, B.E, MCA, BCA and Diploma students for
all branches for their academic projects.
For more details call us or watsapp us @ 7676768124 0r 9545252155
Email your base papers to "adritsolutions@gmail.co.in"
We are providing IEEE projects on
1) Cloud Computing, Data Mining, BigData Projects Using JAva
2) Image Processing and Video Procesing (MATLAB) , Signal Processing
3) NS2 (Wireless Sensor, MANET, VANET)
4) ANDRIOD APPS
5) JAVA, JEE, J2EE, J2ME
6) Mechanical Design projects
7) Embedded Systems and IoT Projects
8) VLSI- Verilog Projects (ModelSim and Xilinx using FPGA)
For More details Please Visit us at
Adrit Solutions
Near Maruthi Mandir
#42/5, 18th Cross, 21st Main
Vijaynagar
Bangalore.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
The Cloud based services provide much efficient
and seamless ways for data sharing across the cloud. The fact
that the data owners no longer possess data makes it very
difficult to assure data confidentiality and to enable secure
data sharing in the cloud. Despite of all its advantages this
will remain a major limitation that acts as a barrier to the
wider deployment of cloud based services. One of the possible
ways for ensuring trust in this aspect is the introduction of
accountability feature in the cloud computing scenario. The
Cloud framework requires promotion of distributed
accountability for such dynamic environment[1]. In some
works, there‘s an accountable framework suggested to ensure
distributed accountability for data sharing by the generation
of only a log of data access, but without any embedded feedback
mechanism for owner permission towards data
protection[2].The proposed system is an enhanced client
accountability framework which provides an additional client
side verification for each access towards enhanced security of
data. The integrity of content of data which resides in the
cloud service provider is also maintained by secured
outsourcing. Besides, the authentication of JAR(Java Archive)
files are done to ensure file protection and to maintain a safer
environment for data sharing. The analysis of various
functionalities of the framework depicts both the
accountability and security feature in an efficient manner.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Survey on Mobile Commerce Security Issues and Applicationstheijes
Electronic saving money and Mobile managing an account are seen as one of the best business-to-buyer applications in electronic trade and versatile business. The utilization of e-saving money and m- managing an account particularly in created nations has become quickly. Low charges, time investment funds and opportunity from time and spot have been observed to be generally imperative components of e-managing an account and m-saving money. These administrations are simple to utilize helpful and good with way of life , pace of administration conveyance is quick. There are two sorts of administrations offered in e-keeping money and m-keeping money, i.e. A) Notifications and alarms and B) Data, in which the bank sends messages containing data or notice required by the client. In this paper shows another system for using so as to enhance security of these messages steganography and cryptography system together.
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...CSCJournals
It is understood by studies that wireless data services is crucial for users to access locationbased services. As in location-dependent services, the data value for a data item depends on geographical locations. In general, the Location Based Services includes the services to identify the location of a person or object like searching of the nearest Banking, Cash Machine Receiving Alerts, Location Based Advertising etc. With the rapid adoption of mobile devices as a primary interface to network of services, there is a considerable risk with respect to authentication and authorization. To guard against risk, trustworthy authentication and secure communication are essential especially in Location Based Services. The purpose of this study is to identify security risks in mobile transactions specially in location based services like mobile banking. Current mobile banking authentication is challenging and identified as a major security risk. Identify the factors why customer distrusts mobile banking. Furthermore, identifying security issues between mobile devices and mobile banking systems. Finding which approach is more suitable and secure for mobile banking transaction between customer and bank.
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
The Internet of Things (IoT) alludes to the continually developing system of physical articles that component an
IP address for web availability, and the correspondence that happens between these items and other Web
empowered gadgets and frameworks. The security issues of the Internet of Things (IoT) are straight forwardly
identified with the wide utilization of its framework. IoT securities and enhancing the design and several
elements of this work showcases various security issues with respect to IoT and thinks of solutions for the issues
under the advancements included. Here we are going to do a study of all the security issues existing in the
Internet of Things (IoT) alongside an examination of the protection issues that an end-client might confront as
an outcome of the spread of IoT. Most of the overview is centred around the security emerging out of the data
trade innovations utilized as a part of Internet of Things. As a piece of IoTs, genuine concerns are raised over
access of individual data relating to gadget and individual protection. This review tells about the security and
protection issues of IoT.
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
We are providing training on IEEE 2016-17 projects for Ph.D Scalars, M.Tech, B.E, MCA, BCA and Diploma students for
all branches for their academic projects.
For more details call us or watsapp us @ 7676768124 0r 9545252155
Email your base papers to "adritsolutions@gmail.co.in"
We are providing IEEE projects on
1) Cloud Computing, Data Mining, BigData Projects Using JAva
2) Image Processing and Video Procesing (MATLAB) , Signal Processing
3) NS2 (Wireless Sensor, MANET, VANET)
4) ANDRIOD APPS
5) JAVA, JEE, J2EE, J2ME
6) Mechanical Design projects
7) Embedded Systems and IoT Projects
8) VLSI- Verilog Projects (ModelSim and Xilinx using FPGA)
For More details Please Visit us at
Adrit Solutions
Near Maruthi Mandir
#42/5, 18th Cross, 21st Main
Vijaynagar
Bangalore.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
The Cloud based services provide much efficient
and seamless ways for data sharing across the cloud. The fact
that the data owners no longer possess data makes it very
difficult to assure data confidentiality and to enable secure
data sharing in the cloud. Despite of all its advantages this
will remain a major limitation that acts as a barrier to the
wider deployment of cloud based services. One of the possible
ways for ensuring trust in this aspect is the introduction of
accountability feature in the cloud computing scenario. The
Cloud framework requires promotion of distributed
accountability for such dynamic environment[1]. In some
works, there‘s an accountable framework suggested to ensure
distributed accountability for data sharing by the generation
of only a log of data access, but without any embedded feedback
mechanism for owner permission towards data
protection[2].The proposed system is an enhanced client
accountability framework which provides an additional client
side verification for each access towards enhanced security of
data. The integrity of content of data which resides in the
cloud service provider is also maintained by secured
outsourcing. Besides, the authentication of JAR(Java Archive)
files are done to ensure file protection and to maintain a safer
environment for data sharing. The analysis of various
functionalities of the framework depicts both the
accountability and security feature in an efficient manner.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Survey on Mobile Commerce Security Issues and Applicationstheijes
Electronic saving money and Mobile managing an account are seen as one of the best business-to-buyer applications in electronic trade and versatile business. The utilization of e-saving money and m- managing an account particularly in created nations has become quickly. Low charges, time investment funds and opportunity from time and spot have been observed to be generally imperative components of e-managing an account and m-saving money. These administrations are simple to utilize helpful and good with way of life , pace of administration conveyance is quick. There are two sorts of administrations offered in e-keeping money and m-keeping money, i.e. A) Notifications and alarms and B) Data, in which the bank sends messages containing data or notice required by the client. In this paper shows another system for using so as to enhance security of these messages steganography and cryptography system together.
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...CSCJournals
It is understood by studies that wireless data services is crucial for users to access locationbased services. As in location-dependent services, the data value for a data item depends on geographical locations. In general, the Location Based Services includes the services to identify the location of a person or object like searching of the nearest Banking, Cash Machine Receiving Alerts, Location Based Advertising etc. With the rapid adoption of mobile devices as a primary interface to network of services, there is a considerable risk with respect to authentication and authorization. To guard against risk, trustworthy authentication and secure communication are essential especially in Location Based Services. The purpose of this study is to identify security risks in mobile transactions specially in location based services like mobile banking. Current mobile banking authentication is challenging and identified as a major security risk. Identify the factors why customer distrusts mobile banking. Furthermore, identifying security issues between mobile devices and mobile banking systems. Finding which approach is more suitable and secure for mobile banking transaction between customer and bank.
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
The Internet of Things (IoT) alludes to the continually developing system of physical articles that component an
IP address for web availability, and the correspondence that happens between these items and other Web
empowered gadgets and frameworks. The security issues of the Internet of Things (IoT) are straight forwardly
identified with the wide utilization of its framework. IoT securities and enhancing the design and several
elements of this work showcases various security issues with respect to IoT and thinks of solutions for the issues
under the advancements included. Here we are going to do a study of all the security issues existing in the
Internet of Things (IoT) alongside an examination of the protection issues that an end-client might confront as
an outcome of the spread of IoT. Most of the overview is centred around the security emerging out of the data
trade innovations utilized as a part of Internet of Things. As a piece of IoTs, genuine concerns are raised over
access of individual data relating to gadget and individual protection. This review tells about the security and
protection issues of IoT.
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Design Approach for a Novel Traffic Sign Recognition System by Using LDA and ...IJERA Editor
This research paper highlights the problems that are encountered in a typical Traffic Sign Recognition System
like incorrect interpretation of a particular traffic sign which is observed by a driver while driving a vehicle
causing misunderstanding thereby resulting in road accidents. The visibility is affected by many environmental
factors such as smoke, rain, fog, humid weather, dust etc. and it is very difficult to understand the traffic signs in
this situations, causing misinterpretations of the particular traffic sign and resulting in road accidents. In order to
avoid this condition, a novel method of recognizing traffic signs is developed which take into consideration the
color and shape of the traffic sign. A algorithm called as Linear Discriminant Analysis (LDA) is used for
classification of different groups of traffic signs which are predefined by a particular set of features after the
process of Image Segmentation. The images are segmented by using the color and shape features of an image
and the features are extracted by using the Haar Transform and then the classification of images is done by using
Linear Discriminant Analysis Algorithm. Finally the GUI of traffic sign images is prepared by using the
software tool called as MATLAB.Our main objective is to recognize partially occluded traffic signs in a cloudy
environment by using LDA and to make an efficient Traffic Sign Detection system which will be capable of
recognizing and classifying any kind of known traffic sign from the other traffic signs by considering the color
and shape of the traffic sign on the basis of supervised classification of the training data so that any error which
results in a faulty detection or incorrect detection of traffic sign can be eliminated.
Uloga lidera u transformaciji prodajne organizacijeTomislav Bekec
Prezentacija s konferencije "Superprodavač" 2014.
Koliko ste promjena pokušali napraviti u posljednjih 2-3 godine u svojim prodajnim organizacijama kako bi se oduprli krizi i nastavili uspješno poslovati? Možda ste proširivali ili smanjivali asortiman, uvodili nove proizvode, mijenjali politiku cijena, reorganzirali teren ili mijenjali opise poslova ljudima, smanjivali im place ili uvodili provizisjki sustav nagrađivanja, uvodili novi software ili sustav izvještavanja…
Koju god promjenu pokušali uvesti u svoju organizaciju brojke rade protiv Vas. Prema svim stranim i domaćim istraživanjima preko 70% organizacijskih promjena ili propadne ili ne postigne ciljeve postavljene prije početka promjene. Na ovom predavanju otkrijte najčešće greške koje radimo u provođenju promjena u prodajnim organizacijama i kako prodajni manager ima ključnu ulogu u povećanju šanse za uspješno provođenja promjena!
Michaelis-Menten Kinetics in Transient State: Proposal for Reversible Inhibit...IJERA Editor
The enzymatic processes according Michaelis-Menten kinetics have been studied from various approaches to
describe the inhibition state. Proposals for inhibition were compared from a generic process, where kinetic
constants have received unitary values, and the numeric value of the concentration of substrate was ten (10)
times higher than the numerical value of the concentration of enzyme. For each inhibition model proposed,
numerical solutions were obtained from nonlinear system of ordinary differential equations, generating results
presents by graphs showing the variation of the enzyme and enzyme complexes, also the variation of substrate
and product of the reaction. Also, was designed a model with performance, indicating similar behavior to that
seen in the Michaelis-Menten kinetics, where complex of reaction is rapidly formed and throughout the process,
tends to decay to zero. Thus, in this new proposed model, the effect of inhibition starts at zero and, throughout
the process, tends to the nominal value of the initial enzyme concentration. Such responses have proved to be
valid for different values of enzyme concentration and process time, showing robustness. The proposed model
was applied to the hydrolysis of disaccharides, providing a setting with conservation of mass of the model at the
end of the process regarding the responses of the carbohydrate concentration.
TEDxWSB story of life.
Create, Win, Fail, Learn Again.
It's a story of every startup person in this room.
Made in Poland, by Polish people.
Please share it
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
As per the recent studies, the volatile growth has been seen in the use of mobile devices as
the supporting technology for accessing Internet based services, as well as for personal
communication needs in networking. Various studies indicate that it is impossible to utilize strong
cryptographic functions for implementing security protocols on mobile devices. Our research negates
this. Explicitly, a performance analysis focused on the most commonly used cryptographic protocols
based on the location address (latitude & longitude) of the user for mobile applications and projected
provably secure authentication protocol that is more efficient than any of the prevailing
authentication protocol is being used by the network security methods. Understanding the use of
public key cryptography which makes potential use of discrete logarithms problem. The security of
ECC depends on the difficulty of Elliptic Curve Discrete Logarithm. To provide secure
communication for mobile devices, authenticated protocol is an important primitive for establishing
trusted connection. In this paper, it has been shown that the location based system using improved
Rabin Algorithm provides a better security and acquires much less energy consumption than the
existing authentication protocols.
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...ijcisjournal
Recently the demand of mobile phones and their applications are increasing rapidly and as a result, it becomes essential to design and/or improve the existing PKI (Public Key Infrastructure) useful for mobile phones or devices. Since a mobile phone has small screen, low computing power, small storage capacity etc, the present paper proposes an ECC-based mobile-PKI that overcomes these limitations and supports various mobile-based applications, because the use of ECC significantly reduces the computation cost, message size and transmission overhead over RSA based PKI as 160-bit key-size in ECC provides comparable security with 1024-bit key in RSA. Also the proposed method includes a Mobile Home Agent (MHA) per user and a Registration Authority (RA) that further minimize the major work/processing loads of mobile phone and Certificate Authority (CA), respectively. This paper addresses a secure implementation of the proposed M-PKI, whose security analysis against different attacks shows that all attacks are protected. Finally, a comparative study of the M-PKI with the existing PKI is done, which gives satisfactory performance.
Secure and efficient handover authentication and detection of spoofing attackeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Study On Double Encrypt Security Model Of Mo...Abebe Tora
Study On Double Encrypt Security Model Of Mobile Commerce Based On The WAP. presented by Abebe Tora and Sisay Tekile.
graduate student @ wolaita sodo university. 2024
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKijmnct
Nowadays security is an evident matter in designing networks and much research has been done in this
field. The main purpose of the research is to provide an appropriate instruction for data transmission in a
reliable platform. One of the instructions of transferring information is to use public networks like internet.
The main purpose of the present paper is to introduce that enables the users to enter to a new security level.
In this paper, VPN as one of the different instructions for establishing the security proposed to be
examined. In this type, tunneling method of internet protocol security (IPsec) is used. Furthermore, the
advanced method of scanning fingerprint is applied to establish authentication and Diffie-Hellman
algorithm for coding and decoding data, of course with conversion in this algorithm.
Design and development of non server peer 2 peer secure communication using j...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Securing Mobile Cloud Using Finger Print AuthenticationIJNSA Journal
Mobile cloud computing becomes part of mobile users daily life transactions. Mobile devices with Internet capabilities have increased the use of mobile clouding computing. Due to hardware limitations in mobile devices, these devices can't install and run applications require heavy CPU processing or extensive memory. Cloud computing allows mobile users to synchronize their data with remote storage and utilize applications require heavy CPU processing or extensive memory such as Microsoft Office or Adobe Photoshop, as they run in a desktop computer.
The combination of cloud computing and mobile computing introduces mobile cloud computing, which also present new issues of security threats such as unauthorized access to resources exist in mobile cloud. Protecting mobile cloud computing from illegitimate access becomes an important concern to mobile users. This paper proposes and implements a new user authentication mechanism of mobile cloud computing using fingerprint recognition system. Fingerprint images of mobile users can be captured and processed using mobile phone camera to access mobile cloud computing . The implementation of the proposed solution in different mobile operating systems and devices show security enhancement in mobile cloud computing with accepted performance level.
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
Practical requirements for securely demonstrating identities between two handheld
devices are an important concern. The adversary can inject a Man-In- The-Middle (MITM) attack to
intrude the protocol. Protocols that employ secret keys require the devices to share private
information in advance, in which it is not feasible in the above scenario. Apart from insecurely
typing passwords into handheld devices or comparing long hexadecimal keys displayed on the
devices’ screen, many other human-verifiable protocols have been proposed in the literature to solve
the problem. Unfortunately, most of these schemes are unsalable to more users. Even when there are
only three entities attempt to agree a session key, these protocols need to be rerun for three times.
So, in the existing method a bipartite and a tripartite authentication protocol is presented using a
temporary confidential channel. Besides, further extend the system into a transitive authentication
protocol that allows multiple handheld devices to establish a conference key securely and efficiently.
But this method detects only the outsider attacks. Method does not consider the insider attacks. So,
in the proposed method trust score based method is introduced which computes the trust values for
the nodes and provide the security. The trust score is computed has a positive influence on the
confidence with which an entity conducts transactions with that node. Network the behavior of the
node will be monitored periodically and its trust value is also updated .So depending on the behavior
of the node in the network trust relation will be established between two nodes.
Biometric Identification and Authentication Providence using Fingerprint for ...IJECEIAES
The raise in the recent security incidents of cloud computing and its challenges is to secure the data. To solve this problem, the integration of mobile with cloud computing, Mobile biometric authentication in cloud computing is presented in this paper. To enhance the security, the biometric authentication is being used, since the Mobile cloud computing is popular among the mobile user. This paper examines how the mobile cloud computing (MCC) is used in security issue with finger biometric authentication model. Through this fingerprint biometric, the secret code is generated by entropy value. This enables the person to request for accessing the data in the desk computer. When the person requests the access to the authorized user through Bluetooth in mobile, the Authorized user sends the permit access through fingerprint secret code. Finally this fingerprint is verified with the database in the Desk computer. If it is matched, then the computer can be accessed by the requested person.
1. Ali Mirarab Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 11(Version - 6), November 2014, pp.163-167
www.ijera.com 163 | P a g e
A New Framework for Secure M-Commerce Ali Mirarab and Abdol-Reza Rasouli Kenari Electrical and Computer Department, Qom University of Technology, Qom, Iran Abstract By combining the wireless network and E-commerce, suppliers can provide a more convenient and quicker service on a human scale for their customers. The main advantages of such services are their high availability, independence of physical location and time. Mobile commerce raises a number of security and privacy challenges. However, security has always been the key issue for the development of mobile E-commerce, which is more vulnerable than the traditional E-commerce mode. . In order to solve the problem of security gap in the transmission of mobile E-commerce information, a framework based on J2ME/MIDP is proposed, which combines double layer encryption schemes, stego-image and secure XML messages which transferred between the mobile terminal and the server. Our method provide strong secure and invisible communication with high security and high operating efficiency that compatible with many types of mobile terminal.
Keywords: M-Commerce Security, ECC, J2ME/MIDP, J2EE, Random LSB Steganography, XML, Double Layer Encryption.
I. Introduction
With the development of mobile technology and the extensive use of intellectual mobile terminal, the mobile E-commerce has become a brand new method for the business activity for both individuals and enterprises. By combining the wireless network and E-commerce, suppliers can provide a more convenient and quicker service on a human scale for their customers [3]. Mobile commerce (m-commerce) is providing commercial services that are accessible by using mobile devices, typically a mobile terminal. The main advantages of such services are their high availability, independence of physical location and time [6]. Mobile commerce raises a number of security and privacy challenges. However, security has always been the key issue for the development of mobile E-commerce, which is more vulnerable than the traditional E-commerce mode. The broadcast nature of the wireless communication and increased popularity of wireless devices introduce serious security vulnerabilities. Mobile users and providers must be assured of the correct identity of the communicating party; user and signaling data must be protected with confidentiality and integrity mechanisms.
Despite the fact that operators are announcing or rolling out Wireless Applications Protocols (WAP), I-mode and java-based information, the platforms have gaping security holes. In order to solve the problem of security gap in the transmission of mobile E-commerce information, a framework based on J2ME/MIDP is proposed, which combines double layer encryption schemes, stego-image and secure XML messages which transferred between the mobile terminal and the server.
II. Related Work
In this section, we present counter measure solutions that have been proposed to securing M- Commerce. Pan Tiejun et al. [1] proposed a secure solution which is based on WPKI with Bluetooth earphone. Authors present a solution in which the mobile commerce security is enhanced by using Wireless Public Key Infrastructure (WPKI). An WIM (WAP Identity Module or Wireless Identification Module) Bluetooth earphone with ESAM (Embedded Secure Access Module) is connected to the Smartphone by Bluetooth interface for ensuring the end to end security ability between user and mobile commerce service providers and storing private data, give the architecture of mobile commerce security system based on WPKI with Bluetooth earphone, design the function of each roles in the system.
Pan Tiejun et al. [2] present an approach in which the mobile security is enhanced by an isolated external electronic security key (eKey) with a security enhancement mechanism. They propose an advanced mobile security solution and related security methodology based on distribute key without changing hardware configuration of the mobile devices. The solution consists of the UE (User Equipment), an electronic security key (eKey) which is connected to the mobile device by adaptable interface for enhancing the UE security ability and storing private data, CA with digital certification and web server which provides the M-commerce services. UE communicates with web server and CA via
RESEARCH ARTICLE OPEN ACCESS
2. Ali Mirarab Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 11(Version - 6), November 2014, pp.163-167
www.ijera.com 164 | P a g e
wireless mobile net and Internet. UE communicates with eKey via adapted interface (e.g., COMM, USB and Bluetooth). Authors believes M-commerce security is enhanced by using external security key and specified policies including user confidentiality, mutual authentication, data integrity and confidentiality. Furthermore, the design of eKey is given which put emphasis on the hardware security solution and the communication mechanism between main controller and security module. In this way, the M-commerce security problem is solved to a certain extent. Feng TIAN et al. [3] proposed a double layer encryption schemes based on WAP, in order to solve the problem of security gap in the transmission of mobile E-commerce information through WAP gateway, which combines with WAP security architecture and mobile E-commerce security architecture. The data is encrypted with the public key of application server on the mobile terminal firstly, and then the encrypted data is encrypted again with WTLS in the wireless network and TLS/SSL in wired networks, which realizes the double layer encryption transmission. The digital signature and verification based on elliptic curve cryptography are adopted in this system, which can fast verify the identity of both parties. Suzhen Wang et al. [4] proposed the solution of security vulnerability in mobile E-commerce based on the "double encryption model". In this model, each symmetric encryption algorithm, public key encryption algorithm and message digest algorithm owned by mobile terminals and content servers has a priority, the most widely used algorithm has the highest priority; the second widely used algorithm has a second priority, and so on. This solution can reduce the communication cost of the encryption consultations between mobile terminals and servers, shorten the time internal of consultations, and increase the connection speed and security degree in mobile E-commerce transaction. This solution has built a secure channel between mobile terminal and content server because the data is protected in the whole process of transmitting, so the solution has solved the weak point that the WAP gateway be able to see clearly of the message.
Pratiksha Y. Pawar et al. [5] presented security of these systems using Random LSB steganography and cryptography method. The proposed method is more safe and secure instead of using either steganography or cryptographic method. They shows secure and invisible communication in M-banking as well as e- banking. In this paper instead of direct sending information, it is encrypted first using encryption algorithm and then this encrypted information is processed to hide into an image using a password so that stego-image contains hidden message which is not in plaintext form. Another important point is that encrypted information is hidden into an image using “Random LSB Steganography” that is embedding data in non-sequential LSB insertion pattern so that it is unintelligible and difficult to detect. The stego- image is put on a web site then the URL of the web site is sent to the user. After receiving the URL, the user downloads the picture by a special program. The user can extract information from the picture only if the password entered is correct. This information will be in encrypted form user will decrypt it using the decryption algorithm so that user will get required information. The proposed scheme has been implemented using J2EE language for e-banking and J2ME language for m-banking. The method implementation supports all java enabled mobiles for m-banking application. Dalia nabil Kmal et al. [6] aims to present some suggestions to improve m-commerce security and limit the m-commerce drawbacks. These suggestions related to the following functional: End-to-End Transport Layer Security by Java 2 micro edition/ mobile information device profile (J2ME/MIDP). Using J2ME/MIDP to mobile communication overcome the security challenges faced with WAP technology, but securing the XML messages transferred between the mobile terminal and the server would give high level of integrity for the data itself not for the physical connection.
III. Proposed Framework
In our method instead of direct sending information in plaintext form. We are encrypting this information using “ECC” algorithm and then encrypted information is hidden into the picture by using password and “Random LSB Steganography algorithm”. This stego-image is placed in another website and address of that website is sent to user. User downloads the picture from website. User extracts information from picture by using password then user gets information in encrypted form. J2ME provides several levels of security, such as class loader, byte code verifier, and security manager. These security levels protect client systems from unreliable programs. The security advantages of J2ME over WAP are end-to-end security, less use of network and content-based encryption.
End-to-end security: J2ME supports end-to-end encryption, authentication, and verification. In WAP, a request from a wireless device is encrypted in WTLS and this request needs to be decrypted as Transport Layer Security (TLS) data. While this conversion takes place, the data is unencrypted making it highly vulnerable. J2ME does not need a gateway between the device and the server. This allows J2ME to provide end-to-end security. There is no conversion of data from WTLS to TLS, thereby
3. Ali Mirarab Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 11(Version - 6), November 2014, pp.163-167
www.ijera.com 165 | P a g e
eliminating the chance of the data being unencrypted at any point of time. Less use of network: J2ME allows data to be processed locally, unlike WAP that needs to connect to the network for any kind of data processing. This feature in J2ME in turn reduces the possibility of data loss or theft. Content-based encryption: J2ME applications process data before sending it across a network. A J2ME application can set the security policy based on the content. The proposed suggestion aim to secure XML messaging between a J2ME/MIDP wireless front end and a JSP page back end. XML digital signature technology can help to implement lightweight and flexible security solutions for wireless Web services applications. XML is becoming a major data exchange protocol in the world of Web services. XML messages that drive Web services often need to go through multiple intermediaries before they reach destinations. So, it is important that we secure the communication content from end to end. The best way to do it is to ship an XML document and its security information (such as signatures, digests, keys, and so on.) altogether as a single document. Handling the XML digital signature in MIDP applications IBM alpha Works develops a Java package called XML Security Suite, which supports the latest XML digital signature specification. As known, to handle XML digital signatures, the wireless devices being used need to support the following functions: Read and write data from/to an XML document and Sign the message and verify the signature. These functions require a cryptography API that is not part of the current MIDP specification. The bouncy castle crypto APIs is an open source, lightweight cryptography package for the Java platform. It supports a large number of cryptography algorithms and provides an implementation for JCE. Because Bouncy Castle is designed to be lightweight, it can run from J2SE to J2ME (including MIDP) platforms. It is the only complete cryptography package that runs on MIDP. Together XML digital signature specification and the usage of several different Bouncy Castle key generators, encoding engines, digital signature singers, and a digest engine. 3.1 Encryption Algorithm This mobile E-commerce security system adopts a double layer encryption schemes in its data transmission and provides a safe transmission for its data. We use Elliptic Curve Cryptography in order to encrypt data. The security transmission process is as shown in figure 3: 1) The terminal encrypts XML message M0 to get M1 with the public key PA of application server, then encrypts M1 with the key Ke1, and gets M2.
2) The message M2 decrypts with Ke1 and gets the encrypted file M1.
3) The message M1 encrypts by Ke2 and gets M3
4) Then this encrypted information is processed to hide into an image using a password so that stego- image contains hidden message which is not in plaintext form (explained in next section) and then sends it to the application server. 5) The application server will decrypts M3 with Ke2 and get M1, then decrypts M1 with its own private key dA and gets the cleartext M0. Fig. 1 Encryption Algorithm Process. 3.2 LSB Steganography Image compression techniques are extensively used in steganography. Among the two types of image compressions, lossy compression and lossless compression, lossless formats offer more promises. Typical examples of lossless compression formats are CompuServe’s GIF (Graphics Interchange Format) and Microsoft’s BMP (Bitmap) [13]. In this work, for e-banking we are using BMP format and for m-banking we are using GIF format. When images are used as carrier in Steganography they are generally manipulated by changing one or more of the bits of the byte or bytes that make up the pixels of an image. The message is stored in the LSB of one color of the RGB value. A BMP is capable of hiding quite a large message. The amount of information that can be hidden in GIF images is less as compared with BMP Images. Embedding information in GIF images using LSB technique results in almost same as those of embedding in BMP. This method hides information in the least significant bits of pixels. In this method each byte of information is hidden in two pixels. For hiding information a byte is divided into an eight bits. By using password two pixels are selected in which a byte of information is hidden. An algorithm in [1] is used to select pixels to hide data. In this algorithm image is segmented into n block of m pixels. A block is selected according to password and the information is hidden in an empty pixel of this block. The algorithm for selecting a block and an empty pixel in that block as follows:
If the selected block starts with the pixel number x and has m pixels then the number of last pixel is
4. Ali Mirarab Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 11(Version - 6), November 2014, pp.163-167
www.ijera.com 166 | P a g e
x+m-1. This algorithm uses an array of size m+1 for remembering empty pixels of current block. This array contains the number of pixels having no data. The last cell of the array is the total empty pixels in the current block. According to the password, an empty pixel is selected and the last empty pixel number is copied to this array cell. After this operation the total number of empty pixels on the block decreases by one. This method is also used for selecting a block to hide the information in itself. After selecting the pixels we hide a byte within them. Each pixel has three colors (RGB), and the information is stored in the LSB of these colors. Fig. 2 LSB Steganography process.
IV. Experimental Work
The application we designed and implemented provides a prototype solution for securing sensitive data. This section presents a brief discussion of the design starting with the client environment and moving on to the server environment. In this paper we are describing implementation of M-Commerce service. A. The Client Environment On the client side we used the J2ME wireless toolkit 1.0.4 [6] provided by Sun. The wireless toolkit is a set of tools that provide J2ME developers with the emulation environments, documentation, and examples to develop MIDP-compliant applications. Developers are thus able to check the valid operation of their applications before deploying them on actual physical devices. The MIDP application is packaged inside a Java archive (JAR) file, which contains the application class and resource files. This JAR file is actually downloaded to the physical device (mobile terminal) along with the Java application descriptor file. In the client environment user sends request, receives B. The Server Environment To benefit from a pure Java solution, we implemented the server-side application in accordance with the J2EE specifications [5]. Servlet classes are packaged in a web archive (WAR) file and deployed on the J2EE application server. We used the J2EE reference implementation server version 1.3.1 provided by Sun. The database server we used is the Oracle 11g.
The Java Servlets communicate with the database using the well-known Java database connectivity (JDBC) API and the new javax.sql package. Some of the services addressed by the javax.sql package are connection pooling, distributed transactions and data source retrieval using logical names. Instead of loading the specific JDBC driver each time we want to connect to the database, we used the Java naming and directory interface (JNDI) to retrieve the data source using its logical name from a JNDI-complaint directory service on the J2EE server. In the server environment there is authentication Servlet to authenticate client, service Servlet which provides services requested by client like account balance, transaction, ministatement, cheque etc. This environment also contains encryption program and LSB encoding program.
V. Conclusions
An ideal solution of mobile commerce security vulnerabilities is to develop the end to end security model, which protects each weak link in mobile e- commerce transaction process to ensure the data from the transfer point to the final destination is entirely safe. Always there is no perfect secure system, especially in m-commerce since the mobile communication system and all its applications still in the childhood level. But also the mobile wireless hackers and crackers still in the same level. Using J2ME/MIDP to mobile communication overcome the security challenges faced with WAP technology, since there is no decryption and encryption performed in the WAP proxy server. Our framework has the following advantages: 1. This method is compatible with many types of mobile terminal. 2. In this method before steganography in the picture, encrypted information is encoded by double layer encryption therefore if person manages to extract information from the picture he will not be able to decode it without having the key. 3. In this method the information is never placed on the internet. Thus, the possibility of disclosure of information is very low. 4. In this method use of combination of steganography and cryptography provides strong secure and invisible communication. 5. High security: The adoption of double layer encryption schemes, on one hand, solves the security problem thoroughly exposed in the WAP gateway data information decrypting and the encrypting process; on the other hand, the ECC public key system is obviously superior to RAS&DSA. The decryption time for ECC and RSA&DSA’s comparison is as shown in figure3.
5. Ali Mirarab Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 11(Version - 6), November 2014, pp.163-167
www.ijera.com 167 | P a g e
Fig. 3 Decryption time comparison of ECC and RSA&DSA. 6. Easier implement for the system: This plan does not need to add any devices in mobile terminal, application server or system reconfiguration. 7. High operating efficiency: ECC is much faster than RSA and DSA for its application of elliptic curve crypto under the same resources, especially fit for the low calculating mobile terminal. In document [8], the encryption and decryption performance comparison on 8 bits’ smart card about RSA and ECC is as shown in table 1. Table 1: Performance comparison of RSA and ECC
Time
CPU: Atmega 128.8MHZ
RSA1024
ECC168
Encryption Speed (ms)
10000
0.39
Decryption speed (ms)
400
8.15
8. Small storing space: The storing size for ECC’s key and system parameter is much smaller than RSA and DSA. 160 bits’ ECC has the same security extension with 1024 bits’ RSA and DSA, and 210 bits’ ECC the same with 2048 bits’ RSA and DSA, which is specially designed for relatively small storing devices. References [1] P. Tiejun, Zh. Leina, "New Mobile Commerce Security Solution Based on WPKI," 2012 International Conference on Communication Systems and Network Technologies, Rajkot, pp. 485-488, May 2012.
[2] P. Tiejun, Zh. Leina, F. Chengbin, H. Wenji, F. Leilei, "M-commerce Security Solution Based on the 3rd Generation Mobile Communication," 2008 International Symposium on Computer Science and Computational Technology, Shanghai, pp. 364-367, Dec. 2008.
[3] F. Tian, H. Xiao-bing, Y. Wei, " Study of WAP Mobile E-commerce Security on WPKI," 2009 Second International Symposium on Electronic Commerce and Security, Nanchang, pp. 3-6, May 2009. [4] S. Wang, L. Fan, “A solution of mobile E- commerce security problems," 2010 2nd International Conference on Education Technology and Computer (ICETC), Shanghai, pp. 188-192, June 2010. [5] Pawar, Pratiksha Y., S. H. Gawande, and D. G. Deotale. "M-Commerce Security Using Random LSB Steganography and Cryptography", International Journal of Machine Learning and Computing, Vol. 2, No. 4, August 2012, pp. 427-430. [6] Dalia nabil Kmal. “Build A Framework to Optimize M-Commerce Security", Tikrit Journal of Pure Science, Vol. 15, Issue. 2, 2010, pp. 123-127. Ali Mirarab received the M.C.S. degrees of Information Technology. He passed BA has in Tehran University in field of IT engineering. His research interests are in various aspects of IT fields especially security and cloud computing. AbdolReza Rasouli Kenari received the Ph.D. from UTM in 2011 and M.C.S. degrees from the Islamic Azad University in 2006 in Computer Engineering. He is currently Head of Graduate Studies at Qom University of technology. His research interests are in various aspects of data mining and security.