Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(147.85KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Secure E-Commerce Protocol
Khalid Haseeb, Muhammad Arshad, Shoukat Ali, Shazia Yasin
Pages - 132 - 142     |    Revised - 31-03-2011     |    Published - 04-04-2011
Volume - 5   Issue - 1    |    Publication Date - March / April 2011  Table of Contents
MORE INFORMATION
KEYWORDS
Trusted Third Party (TTP), Pretty Good Privacy (PGP), Secure Socket Layer (SSL)
ABSTRACT
E-commerce has presented a new way of doing business all over the world using internet. Organizations have changed their way of doing business from a traditional approach to embrace e-commerce processes. As individuals and businesses increase information sharing, a concern regarding the exchange of money securely and conveniently over the internet increases. Therefore, security is a necessity in an E-commerce transaction. The purpose of this paper is to present a token based Secure E-commerce Protocol. The purpose of this paper is to present a paradigm that is capable of satisfying security objectives by using token based security mechanism.
CITED BY (7)  
1 Mubeen, S., Srinath, N. K., & Subramanya, K. N. (2016). Double Securing from Hackers in B2B E-commerce.
2 Sen, P., Ahmed, R. A., & Islam, M. R. (2015). A Study on E-Commerce Security Issues and Solutions.
3 Nakhumwa, J. N. (2013). Adoption of E-commerce Payment Systems by Commercial Banks in Kenya (Doctoral dissertation, University of Nairobi).
4 Yasin, S., Haseeb, K., & Qureshi, R. J. (2012). Cryptography based e-commerce security: a review. International Journal of Computer Science Issues, 9(2), 132-137.
5 Opoku, S. K. (2012). A Robust Cryptographic System using Neighborhood-Generated Keys. arXiv preprint arXiv:1209.2738.
6 Abbadi, L. (2012). Multi-factor Authentication Techniques for Video Applications over the Untrusted Internet (Doctoral dissertation, University Of Ottawa).
7 Idrizi, F., & Ninka, I. (2012). Some potential challenges during the implementation of security models for electronic transactions. International Journal of Science, Innovation & New Technology.
1 Google Scholar
2 Academic Journals Database
3 CiteSeerX
4 Libsearch
5 Bielefeld Academic Search Engine (BASE)
6 Scribd
7 SlideShare
8 PdfSR
1 William Stallings, “Cryptography and Network Security”, 3rd edition, Prentice Hall,2003
2 D. Berlin, "Information Security Perspective on Intranet," presented at Internet and E-Commerce Infrastructure, 2007.
3 S. R. S. KESH, AND S. NERUR, "A Framework for Analyzing E-Commerce Security," Information Management and Computer Security, vol. 10, no. 4, no. pp. 149-158.
4 X.Sahi and P.C. Wright, “ E-Commercializing Business Operations” Communication of ACM, Feburary,2003 vol.46. no.2 page 83-87.
5 C. BARNES, "Hack Proofing Your Wireless Networks," Syngress Publishing, Rockland, 2002.
6 P. RATNASINGHAM, "Trust in Web-Based Electronic Commerce Security," Information Management and Computer Security, vol. 6, no. 4, no. pp. 162-166, 1998.
7 Anup K. Ghosh “E-Commerce security: No Silver Bullet” IFIP Conference Proceedings; Vol. 142, P: 3 – 16, 1998
8 P. C. O. A.J Menezes, and S.A. Vanstone, Handbook of Applied Cryptography: CRC Press, 1996.
9 L. X. QIN Zhiguang, GAO Rong, "A survey of E-commerce Security," Electronic Science and Technology of China vol. 2, no. 3, Sept 2004.
10 N. M. A. Al-Slamy, "E-Commerce Security," IJCSNS International Journal of Computer Science and Network Security, vol. 8, no. 5, May 2008.
11 Dale Barr, “Public Key Infrastructure”, TECHNOLOGY AND PROGRAMS DIVISION Volume 11, Number 3, December 2004
12 Cetin K. Koc, "Next Generation E-Commerce Security" Information Security Laboratory December 2, 1999
Mr. Khalid Haseeb
Islamia College University - Pakistan
khalidhaseeb@hotmail.com
Dr. Muhammad Arshad
- Pakistan
Dr. Shoukat Ali
- Pakistan
Mr. Shazia Yasin
- Pakistan