This document discusses two methods for securing mobile wallet transactions: custom protocol HTTPS and public-key cryptography. Custom protocol HTTPS requires less computation power but transports decryption keys over networks, making them vulnerable to eavesdropping. Public-key cryptography is more computationally intensive but does not require transporting keys, increasing security as keys are not sent over networks. Examples of each method are provided.