A New Design and Implementation of Mixer Hashing Mechanism for Mobile Transactions

Provided by: International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
Topic: Security
Format: PDF
An elaborate set of data protection methods and techniques has been created to deal with the information security issues which are more while the information is conveyed as physical documents. Various mathematical algorithms and protocols are used to maintain security and integrity of transactions. Sun Java wireless toolkit is generally adopted to implement m-commerce applications. J2ME's Connected Limited Device Configuration (CLDC), Mobile Information Device Profile (MIDP) designed to run on cell phones and other small mobile devices are mainly involved for creating mobile applications.

Find By Topic