An Efficient Iris Authentication Using Chaos Theory Based Cryptography for E-Commerce Transaction

Introduction to An Efficient Iris Authentication Using Chaos Theory Based Cryptography for E-Commerce Transaction:

The main objective of this paper is to give secure transaction to the customers over internet. Generally, as the technology is advancing and globalization is rapidly growing.e-commerce came into existence ,i.e the products and services are sold over internet. Many of the frauds are being done over credit cards when the payment is being done.

To avoid this fraud, this theory has developed.IP technology is widely used by various devices. IP technology uses HTTP protocol, but this protocol uses high power. To, overcome all this disadvantages, a new protocol called constrained application protocol has been developed.

Brief into design and working

COAP is a web transfer protocol developed for resource constrained networks. It uses REST architecture. REST architecture allow applications to rely on loosely coupled services which can be shared and reused and are controlled by the server and identified by a Universal Resource Identifier (URI). It uses some methods used by HTTP.

COAP supports additional functionalities such as multicast, asynchronous communication and subscriptions. The packet overhead compression has drastically reduced the power consumption and has increased the power life time. This is being used in many web applications also. The main aim of the application is to allow the user to access data directly from a web browser.

The complexity of gateway is reduced and the system scalability is increased. Hence, by using this safe transaction can be done by the customers.

Download An Efficient Iris Authentication Using Chaos Theory Based Cryptography for E-Commerce Transaction .

Leave a Reply

Your email address will not be published. Required fields are marked *