Home   >   CSC-OpenAccess Library   >    Manuscript Information
Secure E-Commerce Protocol
Khalid Haseeb, Muhammad Arshad, Shoukat Ali, Shazia Yasin
Pages - 132 - 142     |    Revised - 31-03-2011     |    Published - 04-04-2011
Volume - 5   Issue - 1    |    Publication Date - March / April 2011  Table of Contents
Trusted Third Party (TTP), Pretty Good Privacy (PGP), Secure Socket Layer (SSL)
E-commerce has presented a new way of doing business all over the world using internet. Organizations have changed their way of doing business from a traditional approach to embrace e-commerce processes. As individuals and businesses increase information sharing, a concern regarding the exchange of money securely and conveniently over the internet increases. Therefore, security is a necessity in an E-commerce transaction. The purpose of this paper is to present a token based Secure E-commerce Protocol. The purpose of this paper is to present a paradigm that is capable of satisfying security objectives by using token based security mechanism.
CITED BY (7)  
1 Mubeen, S., Srinath, N. K., & Subramanya, K. N. (2016). Double Securing from Hackers in B2B E-commerce.
2 Sen, P., Ahmed, R. A., & Islam, M. R. (2015). A Study on E-Commerce Security Issues and Solutions.
3 Nakhumwa, J. N. (2013). Adoption of E-commerce Payment Systems by Commercial Banks in Kenya (Doctoral dissertation, University of Nairobi).
4 Yasin, S., Haseeb, K., & Qureshi, R. J. (2012). Cryptography based e-commerce security: a review. International Journal of Computer Science Issues, 9(2), 132-137.
5 Opoku, S. K. (2012). A Robust Cryptographic System using Neighborhood-Generated Keys. arXiv preprint arXiv:1209.2738.
6 Abbadi, L. (2012). Multi-factor Authentication Techniques for Video Applications over the Untrusted Internet (Doctoral dissertation, University Of Ottawa).
7 Idrizi, F., & Ninka, I. (2012). Some potential challenges during the implementation of security models for electronic transactions. International Journal of Science, Innovation & New Technology.
1 Google Scholar 
2 Academic Journals Database 
3 CiteSeerX 
4 Libsearch 
5 Bielefeld Academic Search Engine (BASE) 
6 Scribd 
7 SlideShare 
8 PdfSR 
Anup K. Ghosh “E-Commerce security: No Silver Bullet” IFIP Conference Proceedings; Vol. 142, P: 3 – 16, 1998
C. BARNES, "Hack Proofing Your Wireless Networks," Syngress Publishing, Rockland, 2002.
Cetin K. Koc, "Next Generation E-Commerce Security" Information Security Laboratory December 2, 1999
D. Berlin, "Information Security Perspective on Intranet," presented at Internet and E-Commerce Infrastructure, 2007.
Dale Barr, “Public Key Infrastructure”, TECHNOLOGY AND PROGRAMS DIVISION Volume 11, Number 3, December 2004
L. X. QIN Zhiguang, GAO Rong, "A survey of E-commerce Security," Electronic Science and Technology of China vol. 2, no. 3, Sept 2004.
N. M. A. Al-Slamy, "E-Commerce Security," IJCSNS International Journal of Computer Science and Network Security, vol. 8, no. 5, May 2008.
P. C. O. A.J Menezes, and S.A. Vanstone, Handbook of Applied Cryptography: CRC Press, 1996.
P. RATNASINGHAM, "Trust in Web-Based Electronic Commerce Security," Information Management and Computer Security, vol. 6, no. 4, no. pp. 162-166, 1998.
S. R. S. KESH, AND S. NERUR, "A Framework for Analyzing E-Commerce Security," Information Management and Computer Security, vol. 10, no. 4, no. pp. 149-158.
William Stallings, “Cryptography and Network Security”, 3rd edition, Prentice Hall,2003
X.Sahi and P.C. Wright, “ E-Commercializing Business Operations” Communication of ACM, Feburary,2003 vol.46. no.2 page 83-87.
Mr. Khalid Haseeb
Islamia College University - Pakistan
Dr. Muhammad Arshad
- Pakistan
Dr. Shoukat Ali
- Pakistan
Mr. Shazia Yasin
- Pakistan