E-Commerce: Security and Applications
- 1 Department of Computer Science, Faculty of Ajlun, Al-Balqa Applied University, P.O. Box: 15008 Amman 11134, Jordan
- 2 Department of Computer Engineering, Faculty of Engineering Technology, Al-Balqa Applied University, P.O. Box: 15008 Amman 11134, Jordan
Abstract
This study presents an investigation and comparing of all methods used in E-commerce security. Also it presents suggested methods to make e-commerce more secure. Applications of the E-commerce are demonstrated here. The efficiency of the security methods are measured and such efficiency increases as we combined more security methods with each other. A new method of security is suggested which is a combination between hash algorithm and Public Key Infrastructures (PKI). Index term-public Key Infrastructures (PKI), hash algorithm, E-commerce, security.
DOI: https://doi.org/10.3844/ajassp.2012.1868.1871
Copyright: © 2012 As’ad Mahmoud Alnaser, Ahmed A.M. Sharadqeh, Hazem (Moh’d Said) Hatamleh, Ashraf Abdel-Karim Abu-Ein and Omar AlHeyasat. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
- 3,704 Views
- 3,642 Downloads
- 0 Citations
Download
Keywords
- Public Key Infrastructures (PKI)
- Efficiency Increases
- Security is Suggested
- E-Commerce Emonstrated Security Methods
- Combined More
- Commerce Security