Analyses of electronic commerce security

被引:0
|
作者
Lu, CY [1 ]
Li, M [1 ]
Liang, YM [1 ]
机构
[1] Guilin Univ Elect Technol, Guilin, Peoples R China
来源
THIRD INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE ENGINEERING: DIGITAL ENTERPRISES AND NONTRADITIONAL INDUSTRIALIZATION | 2003年
关键词
secure electronic transaction; digital signature; data encryption standard; Rivest-Shamir-Privcy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper mainly argues the secure problem of electronic commerce. Security is the life of electronic commerce. Aiming at the architecture of electronic commerce, this paper adopts the method of 'from top to bottom', concentrates on analyzing the SET(Secure Electronic Transaction), which is becoming a more and more important standards as a part of web commerce. First, the protocol flow of SET and the main technology which the SET is based on, such as digital signature, double digital signature, and digital envelope are introduced. Because these technologies are based on two kinds of password systems (Asymmetric Encryption and Symmetric Encryption), the security of asymmetric encryption and symmetric encryption is analyzed through DES (Data Encryption Standard) and RSA (Rivest-Shamir-Privcy) which are the most popular asymmetric encryption and symmetric encryption systems. Then the security of digital signature is analyzed. Finally, the paper analyzes the security ability of SET and the privacy blabbing problem caused by digital signature technology.
引用
收藏
页码:598 / 600
页数:3
相关论文
共 50 条
  • [1] Electronic commerce security in electronic commerce - government viewpoint
    Database and Network Journal, 1998, 28 (04):
  • [2] Electronic commerce - Security is the key to net commerce
    不详
    COMMUNICATIONS NEWS, 1996, 33 (12): : 8 - 8
  • [3] A framework for electronic commerce security
    Labuschagne, L
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 441 - 450
  • [4] A security architecture for electronic commerce applications
    De Win, B
    Van den Bergh, J
    Matthijs, F
    De Decker, B
    Joosen, W
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 491 - 500
  • [5] Realization of Information Security in Electronic Commerce
    Li Fu-Guo
    Dong Yu-Jie
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 14 - 16
  • [6] Research on the Security System of Electronic Commerce
    He Quanxiu
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE OF MANAGEMENT SCIENCE AND INFORMATION SYSTEM, VOLS 1-4, 2009, : 161 - 164
  • [7] Security: The Achilles heel of electronic commerce
    Backhouse, JP
    SOCIETY, 1998, 35 (04) : 28 - 31
  • [8] Security: The achilles heel of electronic commerce
    James P. Backhouse
    Society, 1998, 35 : 28 - 31
  • [9] AOL allies for security and electronic commerce
    不详
    DATABASE, 1996, 19 (04): : 79 - 79
  • [10] Research on Network Security in Electronic Commerce
    Gu Yue-sheng
    Li Yan-cui
    Chen Xiao-jing
    2010 SECOND ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2010, : 175 - 178