Views: 157 , Downloads: 107 | CTR: 68 % | Weekly Popularity: ⮙2
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014
A Secure Mobile Bill Payment (MOBILL) Service for M-Commerce
Pavuluri Gnana Ramakrishna, M. Chandra Naik
Instead of paying by cash, check, or credit cards, consumers can also use their mobile devices to pay for a wide range of services and digital or material goods. However, consumers security concerns are a major barrier to broad adoption and use of mobile payments. In this paper, we design a secure operational model for mobile payment in which access control is based on service-oriented architecture. A consumer uses his/her mobile device to get authorization from cloud and generate a QR code as the payment certificate.
Keywords: Mobile Payment, Web Services, Cloud Security
Edition: Volume 3 Issue 9, September 2014
Pages: 2234 - 2237
How to Cite this Article?
Pavuluri Gnana Ramakrishna, M. Chandra Naik, "A Secure Mobile Bill Payment (MOBILL) Service for M-Commerce", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=26091402, Volume 3 Issue 9, September 2014, 2234 - 2237
157 PDF Views | 107 PDF Downloads
Similar Articles with Keyword 'Mobile Payment'
Views: 157 , Downloads: 107 | CTR: 68 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2234 - 2237A Secure Mobile Bill Payment (MOBILL) Service for M-Commerce
Pavuluri Gnana Ramakrishna, M. Chandra Naik
Views: 149 , Downloads: 117 | CTR: 79 % | Weekly Popularity: ⮙2
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 2100 - 2103SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones
Anjaly Raj, Vidya N
Views: 152 , Downloads: 118 | CTR: 78 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013
Pages: 428 - 431A Secure Account based Mobile Payment Protocol with Public Key Cryptography and Biometric Characteristics
Pawandeep Singh Aujla, Harneet Arora
Views: 165 , Downloads: 135 | CTR: 82 % | Weekly Popularity: ⮙5
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013
Pages: 406 - 412Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Tanvir Tahir, Kamar Abbas
Similar Articles with Keyword 'Web Services'
Views: 146 , Downloads: 102 | CTR: 70 % | Weekly Popularity: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1628 - 1631A Survey On XML-Injection Attack Detection Systems
Swati Ramesh Kesharwani, Aarti Deshpande
Views: 136 , Downloads: 103 | CTR: 76 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1886 - 1890A Flexible and Dynamic Failure Recovery Mechanism for Composite Web Services Using Subset Replacement
Shuchi Gupta, Prof. Praveen Bhanodia
Views: 123 , Downloads: 103 | CTR: 84 % | Weekly Popularity: ⮙6
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 2173 - 2176Knowledge Retrieval from Web Server Logs Using Web Usage Mining
Naresh Kumar Kar, H. R. Sharma, Asha Ambhaikar
Views: 132 , Downloads: 103 | CTR: 78 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1362 - 1364Application Research and Penetration Testing on WebSocket Technology
Priyali Mishra, J. Jeysree
Views: 138 , Downloads: 104 | CTR: 75 % | Weekly Popularity: ⮙1
Comparative Studies, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 193 - 195Application for Detecting and Preventing SQL Injection Attacks using Web Service
Anuja A. Patil, Ketaki H. Pangu
Similar Articles with Keyword 'Cloud Security'
Views: 173 , Downloads: 100 | CTR: 58 % | Weekly Popularity: ⮙2
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 735 - 737Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks
Nikhita Nerkar, Vina M Lomte
Views: 142 , Downloads: 100 | CTR: 70 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1845 - 1848A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Views: 137 , Downloads: 104 | CTR: 76 % | Weekly Popularity: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2619 - 2622Information Security in Multi-Cloud Environment
Digambar D. Patil, Megha Singh
Views: 130 , Downloads: 104 | CTR: 80 % | Weekly Popularity: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2369 - 2372Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms
Jaskarandeep Punia, Rajesh Kumar Bawa
Views: 128 , Downloads: 104 | CTR: 81 %
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1695 - 1698Trusted Framework for Secured Information Storage over Cloud Environment
P. Pothuraju, Dasari Rajesh