E-Commerce: Security and Applications
- 1 Department of Computer Engineering, Faculty of Engineering Technology, Al-Balqa Applied University, P.O. Box: 15008 Amman 11134, Jordan
- 2 Department of Computer Science, Faculty of Ajlun, Al-Balqa Applied University, P.O. Box: 15008 Amman 11134, Jordan
This study presents an investigation and comparing of all methods used in E-commerce security. Also it presents suggested methods to make e-commerce more secure. Applications of the E-commerce are demonstrated here. The efficiency of the security methods are measured and such efficiency increases as we combined more security methods with each other. A new method of security is suggested which is a combination between hash algorithm and Public Key Infrastructures (PKI). Index term-public Key Infrastructures (PKI), hash algorithm, E-commerce, security.
Copyright: © 2012 Ashraf Abdel-Karim Abu-Ein, Hazem (Moh’d Said) Hatamleh, Ahmed A.M. Sharadqeh, As’ad Mahmoud Alnaser and Omar AlHeyasat. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
- 2,392 Views
- 2,988 Downloads
- 0 Citations
- Public Key Infrastructures (PKI)
- Efficiency Increases
- Security is Suggested
- E-Commerce Emonstrated Security Methods
- Combined More
- Commerce Security