Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(123.35KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
E-payment Security Analysis In Depth
Adam Ali.Zare Hudaib
Pages - 14 - 24     |    Revised - 20-01-2014     |    Published - 11-02-2014
Published in International Journal of Computer Science and Security (IJCSS)
Volume - 8   Issue - 1    |    Publication Date - February 2014  Table of Contents
MORE INFORMATION
References   |   Abstracting & Indexing
KEYWORDS
E-payment, Security Protocol, Bitcoin, NFC.
ABSTRACT
Technology is the basis of our lives. The growth of the Internet has made it an ease for consumers to find items for purchase, but no longer is cash a viable way for payment. This increase in e-commerce has driven the need to create an online payment system. Unfortunately there are a lot of flaws and internet frauds that people are facing.

In this research we will review different payment protocols and security methods that are being used to run online payment systems. We will survey some of the popular systems that are being used today, with a deeper focus on the PayPal system, NFC and bitcoins. In addition, we will also discuss the weaknesses in the systems that can compromise the customer's trust.
ABSTRACTING & INDEXING
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
REFERENCES
Alex Hern. “Bitcoin me: How to make your own digital currency”. Internet:http://www.theguardian.com/technology/2014/jan/07/bitcoin-me-how-to-make-your-owndigital-currency [Dec. 5, 2013].
“Bitcoin”. Internet: http://en.wikipedia.org/wiki/Bitcoin.html [Dec. 10, 2013].
“Bitcoins”. Internet: http://www.weusecoins.com/en/ [Dec. 8, 2013].
“Description of the Secure Sockets Layer (SSL) Handshake“. Internet:http://www.support.microsoft.com [Dec. 1, 2013].
“Near field communication”. Internet:http://en.wikipedia.org/wiki/Near_field_communication [Dec. 10, 2013].
“NFC and Contactless Technologies”. Internet: http://nfc-forum.org/what-is-nfc/about-thetechnology/ [Dec. 1, 2013].
“PayPal Email Scam – Email Form”. Internet:http://www.fightidentitytheft.com/paypal_scam_email_form.html [Nov. 25, 2013].
“PayPal Email Scam – Web Site Version”. Internet:http://www.fightidentitytheft.com/paypal_scam.html [Nov. 25, 2013].
“PayPal. PayPal - Data Security and Encryption”. Internet: http://www.paypal.com/cgibin/webscr?cmd=p/gen/security-outside[Dec. 10, 2013].
“SearchSecurity.com”. Internet:http://searchsecurity.techtarget.com/sDefinition/0%2C%2Csid14_gci214006%2C00.html [Dec. 12, 2013].
“Secure electronic transaction”. Internet:http://en.wikipedia.org/wiki/Secure_Electronic_Transaction [Dec. 12, 2013].
“SSL/TLS in Detail“. Microsoft TechNet, July 31, 2003.
“SSL: Intercepted today, decrypted tomorrow”. Netcraft, pp. 10-12, May 25, 2013.
“The Secret PayPal Hack Method – 100% Guaranteed!”. Hack Expert, Nov. 11, 2003.Internet: http://www.astronomysight.com/_message/00000465.htm [Dec. 12, 2013].
“The Secure Sockets Layer Protocol”. Internet:http://www.cs.bris.ac.uk/~bradley/publish/SSLP/chapter4.html [Nov. 22, 2013].
Mike Clark. “Inside Secure adds sales agents”. Internet:http://www.nfcworld.com/2012/12/05/321436/inside-secure-adds-sales-agents, Dec. 5, 2012 [Dec. 10, 2013].
Rui Wang, Shuo Chen, XiaoFeng Wang, Shaz Qadeer. ”How to Shop for Free Online Security Analysis of Cashier-as-a-Service Based Web Stores”. Internet:http://research.microsoft.com/pubs/145858/caas-oakland-final.pdf [Dec. 1, 2013].
S. Murdoch and R. Anderson. “Verified by Visa and MasterCard SecureCode: or, How Not to Design Authentication”. Financial Cryptography and Data Security, Jan. 2010, pp. 42-45.
MANUSCRIPT AUTHORS
Mr. Adam Ali.Zare Hudaib
Network Security Research, Poland - Poland
adamhudaib@gmail.com


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions