Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
E-payment Security Analysis In Depth
Adam Ali.Zare Hudaib
Pages - 14 - 24     |    Revised - 20-01-2014     |    Published - 11-02-2014
Volume - 8   Issue - 1    |    Publication Date - February 2014  Table of Contents
E-payment, Security Protocol, Bitcoin, NFC.
Technology is the basis of our lives. The growth of the Internet has made it an ease for consumers to find items for purchase, but no longer is cash a viable way for payment. This increase in e-commerce has driven the need to create an online payment system. Unfortunately there are a lot of flaws and internet frauds that people are facing.

In this research we will review different payment protocols and security methods that are being used to run online payment systems. We will survey some of the popular systems that are being used today, with a deeper focus on the PayPal system, NFC and bitcoins. In addition, we will also discuss the weaknesses in the systems that can compromise the customer's trust.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
1 S. Murdoch and R. Anderson. “Verified by Visa and MasterCard SecureCode: or, How Not to Design Authentication”. Financial Cryptography and Data Security, Jan. 2010, pp. 42-45.
2 “PayPal. PayPal - Data Security and Encryption”. Internet: http://www.paypal.com/cgibin/webscr?cmd=p/gen/security-outside[Dec. 10, 2013].
3 Rui Wang, Shuo Chen, XiaoFeng Wang, Shaz Qadeer. ”How to Shop for Free Online Security Analysis of Cashier-as-a-Service Based Web Stores”. Internet:http://research.microsoft.com/pubs/145858/caas-oakland-final.pdf [Dec. 1, 2013].
4 “The Secure Sockets Layer Protocol”. Internet:http://www.cs.bris.ac.uk/~bradley/publish/SSLP/chapter4.html [Nov. 22, 2013].
5 “SSL: Intercepted today, decrypted tomorrow”. Netcraft, pp. 10-12, May 25, 2013.
6 “SSL/TLS in Detail“. Microsoft TechNet, July 31, 2003.
7 “Description of the Secure Sockets Layer (SSL) Handshake“. Internet:http://www.support.microsoft.com [Dec. 1, 2013].
8 “Secure electronic transaction”. Internet:http://en.wikipedia.org/wiki/Secure_Electronic_Transaction [Dec. 12, 2013].
9 “The Secret PayPal Hack Method – 100% Guaranteed!”. Hack Expert, Nov. 11, 2003.Internet: http://www.astronomysight.com/_message/00000465.htm [Dec. 12, 2013].
10 “PayPal Email Scam – Web Site Version”. Internet:http://www.fightidentitytheft.com/paypal_scam.html [Nov. 25, 2013].
11 “PayPal Email Scam – Email Form”. Internet:http://www.fightidentitytheft.com/paypal_scam_email_form.html [Nov. 25, 2013].
12 “SearchSecurity.com”. Internet:http://searchsecurity.techtarget.com/sDefinition/0%2C%2Csid14_gci214006%2C00.html [Dec. 12, 2013].
13 “Bitcoin”. Internet: http://en.wikipedia.org/wiki/Bitcoin.html [Dec. 10, 2013].
14 “Bitcoins”. Internet: http://www.weusecoins.com/en/ [Dec. 8, 2013].
15 Alex Hern. “Bitcoin me: How to make your own digital currency”. Internet:http://www.theguardian.com/technology/2014/jan/07/bitcoin-me-how-to-make-your-owndigital-currency [Dec. 5, 2013].
16 “Near field communication”. Internet:http://en.wikipedia.org/wiki/Near_field_communication [Dec. 10, 2013].
17 Mike Clark. “Inside Secure adds sales agents”. Internet:http://www.nfcworld.com/2012/12/05/321436/inside-secure-adds-sales-agents, Dec. 5, 2012 [Dec. 10, 2013].
18 “NFC and Contactless Technologies”. Internet: http://nfc-forum.org/what-is-nfc/about-thetechnology/ [Dec. 1, 2013].
Mr. Adam Ali.Zare Hudaib
Network Security Research, Poland - Poland