Open Access Open Access  Restricted Access Subscription or Fee Access

An Improved Method for XML and Encryption

V.T. Noora, C. Manusankar, T. Rajendran, S. Karthik

Abstract


In the early days cards have entered our global community. Although initially they were only used as simple phone cards they now support a large number of applications. This paper will mainly explain the Smart card architecture .This paper explains the algorithm used for this and also it explains the SOAP protocol used for the transmission of it. This paper mainly aimed at security and also used for the security purpose. Finally conclude that this technique is better for the transmission of the data.

Keywords


Cards, Attacks, Security, Encryption, SOAP Protocol

Full Text:

PDF

References


Karthik.S., V.P. Arunachalam and T. Ravichandran, 2008. Multi directional geographical traceback with in directions generalization. J. Comput. Sci., ISSN:1549-3636, 4(8):646-651.

Karthik.S., V.P. Arunachalam and R.M.Bhavdharini, 2008. Analyzing interaction between denial of service (dos) attacks and threats. Proceeding of the IEEE Int. Conf. on Computing, Communication and Networking(ICCCN 2008) 978-1-42435951/08/2008.DOI10.1109/ICCCNET.2008.4787663

Marc Witteman, Power Analysis on Unknown Crypto-Algorithms, presented at the workshop Crypto-graphic security of cards and the internet,Amsterdam, June 2002.

Paul Kocher, Joshua Jaffe and Benjamin Jun, Differential Power Analysis, in proceedings of Advances in Cryptology, CRYPTO ’99, Springer Verlag, 1999.

Ross Anderson & Markus Kuhn, Tamper Resistance a Cautionary Note in proceedings of the SecondUSENIX Workshop on Electronic Commerce Proceedings, Oakland, California, 1996, ISBN1-880446-83-9.

W. Rankl, Smart Card Handbook, Wiley & Sons, ISBN 0471988758, 2nd edition, 2000.

Zhiqun Chen, Java Card for Smart Cards: Architecture and Programmer’s Guide, Addison-Wesley, ISB 0201703297, 2000

Wang Ziyao.The core technology and application of SOA.Beijing: House of Electronics Industry,2008-5

Meng Wei, Zhang Chen, LI Jun-huai, LIU Hai-ling. Web services security model and implementation. Computer Engineering and Application, 2006,26 134-136

(U.S.) O'Neill. Web Services Security technology and theory. RanXiao Man, Guo Wenwei translation. Beijing: Tsinghua University

XML-Signature Syntax and Processing.http://w3c.org/TR/2002/REC-xmldsig-core-20020212/;2002, 2

XML Encryption Requirements. http://www.w3.org/TR/xmlencryption-req; 2002, 3

Rivest, R., "The MD4 Message Digest Algorithm", RFC 1320, MITand RSA Data Security, Inc., April 1992..

Rivest, R., "The MD4 message digest algorithm", in A.J. Menezesand S.A. Vanstone, editors, Advances in Cryptology - CRYPTO '90Proceedings, pages 303-311, Springer-Verlag


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.