Downloads: 112 | Views: 246
Research Paper | Computer Science & Engineering | India | Volume 6 Issue 2, February 2017 | Popularity: 6.2 / 10
An Efficient Trust Model for Online Application using 2-Factor Authentication and Token Based Authentication
Varsha Jotwani, Dr. Amit Dutta
Abstract: Here in this paper security of E-commerce applications using an efficient Two Factor Authentication using Smart Card based Authentication and token based authentication is implemented which provides security from various attacks. Although various Trust Models are implemented for the security of E-commerce applications, but the techniques implemented takes more Storage Cost as well as suffers from User Revocation and Escrow Problem. Hence to overcome these limitations a new and efficient technique using Two Factor Authentications is implemented which not only minimizes the Storage Cost but also provides High User Revocation and Proxy Re- encryption.
Keywords: Smart Card based Authentication, Token based Authentication, Encryption
Edition: Volume 6 Issue 2, February 2017
Pages: 1970 - 1974
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 654 - 659Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial
GVSS Jayanth Anish
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 1075 - 1080Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques
Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1126 - 1129Privacy Preserving Utility Verification of Data Published
Madhushree M