Research on E-commerce User Information Encryption Technology Based on Merkle Hash tree

被引:4
|
作者
Qing, Li [1 ]
机构
[1] Wuhan Univ Sci & Technol, Fac Informat Engn, City Coll, Wuhan 430083, Hubei, Peoples R China
关键词
Merkle; Hash tree; E-commerce; Information encryption;
D O I
10.1109/ICRIS.2019.00098
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In view of the low security of user information encryption technology in the current e-commerce field,in this paper, an electronic commerce user information encryption technology based on Merkle hash tree is proposed. In order to avoid the occurrence of data vulnerabilities in the process of information encryption, the information encryption vulnerability repair processing technology is improved, and finally the effective encryption processing of e-commerce user information is realized. Finally, the experiment proves that the security effect of e-commerce user information encryption technology based on Merkle Hash tree is obviously improved compared with the traditional classical encryption technology.
引用
收藏
页码:365 / 369
页数:5
相关论文
共 50 条
  • [41] The Research of Dynamic Mining Technology in the Application of E-Commerce
    Gao, Rencai
    [J]. ADVANCES IN COMPUTER SCIENCE, ENVIRONMENT, ECOINFORMATICS, AND EDUCATION, PT II, 2011, 215 : 477 - 481
  • [42] Study on the Information Security based on E-Commerce
    Meng, Yu-qiao
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 437 - 439
  • [43] Application research of Ajax technology in e-commerce systems
    Xu, Jinhua
    Liu, Hong
    [J]. NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 2120 - 2125
  • [44] Research of accounting information system under e-commerce
    [J]. Quan, Q. (quanquan@163.com), 1600, Springer Verlag (219 LNEE):
  • [45] Research on Construction of Information Ecological Model in E-commerce
    Wang Xiwei
    Zhao Yunlong
    Liu Mingyan
    [J]. 2009 INTERNATIONAL SYMPOSIUM ON WEB INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 459 - 464
  • [46] Innovative research on encryption and protection of e-commerce with big data analysis
    Shu, Yifu
    Wang, Wenda
    [J]. International Journal of Data Science, 2024, 9 (02) : 123 - 142
  • [47] The effect of information technology on e-commerce and e-marketing in Iran
    Sarani, Ahmad
    Noura, Abbas ali
    Akbari, Zahra Nejad
    [J]. 2006 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI 2006), Proceedings, 2006, : 845 - 850
  • [48] Rating of E-commerce Integrity Based on Decision Tree
    Zhang, Yinghua
    Yang, Zunqi
    Lin, Hai
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 9190 - 9193
  • [49] Certificate revocation system implementation based on the Merkle hash tree
    Jose L. Muñoz
    Jordi Forne
    Oscar Esparza
    Miguel Soriano
    [J]. International Journal of Information Security, 2004, 2 (2) : 110 - 124
  • [50] Research on e-commerce user segmentation and customized marketing strategy based on cluster analysis
    Zhao, Yue
    Niu, Xueyan
    Lin, Shuning
    Su, Fang
    [J]. Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)