Computational Considerations in Security of Electronic Commerce Systems (ECS)

Provided by: IRPN Press
Topic: Developer
Format: PDF
Electronic Commerce (EC) when situated that was prepared their exchanges security like other communication and software systems. In this paper, the need for security EC Systems (ECS) and discusses the threats and services, the main threats include: failure, privacy, manipulation, forging and denial; the main services include: confidentiality, authentication, integration and undeniable. In addition to the challenges and computational considerations such as compatibility of copies distributed geographically dispersed ECS, time (date and time) and formal and mathematical influence is investigated to ECS and algorithm and encryption approaches include: symmetric and asymmetric algorithms and algorithm hash, digital members and digital certificate as services and approaches to confronting with security threats in ECS are reviewed.

Find By Topic