Cryptography security in Online Transaction- A Current Scenario

International Journal of Computer Science (IJCS Journal) Published by SK Research Group of Companies (SKRGC) Scholarly Peer Reviewed Research Journals

Format: Volume 3, Issue 1, No 1, 2015.

Copyright: All Rights Reserved ©2015

Year of Publication: 2015

Author: Zeenat Hasan,Dr. C.P.Agrawal

Reference:IJCS-072

View PDF Format

Abstract

Online transaction is a powerful tool for business expedition that allows different companies to increase their sale through reaching new market and improve customer service. Here people are not interacting directly but rather then they are interacting through electronically therefore business requires coherent ,consistent environment for online transaction. The objective of this paper is to explain the importance of online transaction security and different aspects of it. This research paper presented different ways have presented that increases security level using cryptographic techniques.

References

[1] Thomas L. Mesenbourg, “An Introduction to Ecommerce”, Philippines: DAI-AGILE, 2000 [2] Khalid Haseeb, Dr. Muhammad Arshad, Shoukat ali and Dr. Shazia Yasin “ Secure E- commerce Protocol”, International Journal of Computer Science and Security (IJCSS), Vol. 5 No. 1, pp.742-751, April 2011 [3]D. Berlin, “Information SecurityPerspective on Intranet,” presented at Internet and E- Commerce Infrastructure, 2007. [4] S. R. S. KESH, AND S. NERUR, “A Framework for Analyzing E-Commerce Security,” Information Management and Computer Security, vol. 10, no. 4, no. pp. 149-158. [5] Joel Weise, “Public Key Infrastructure”, SunPSSM Global Security Practice Sun BluePrints™ OnLine August 2001 [6] An Introduction to Cryptography (found in the documentation of PGP® Desktop 8.1). Page 17. June 2004. [7]Jagdev Singh Kaleka, “E-Commerce: Authentication & Security on Internet”, Deptt. of Technical Education and Industrial Training, Govt. of Punjab [8] Cetin K. Koc, “Next Generation E-Commerce Security” Information Security Laboratory December 2, 1999 [9]Dale Barr, “Public Key Infrastructure”, TECHNOLOGY AND PROGRAMS DIVISION Volume 11, Number 3, December 2004 Visual Cryptography and Boolean Operation, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 4, No 2, July 2010..[10] Khalid Haseeb, Dr. Muhammad Arshad, Shoukat ali and Dr. Shazia Yasin “ Secure E- commerce protocol”,International Journal of Computer Science and Security (IJCSS), Vol. 5 No. 1, pp.742-751, April 2011


Keywords

Third Party, Public Key Infrastructure, Certificate Authority, Digital Signature, Secure Socket layer

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

TOP
Facebook IconYouTube IconTwitter IconVisit Our Blog