Research Article Open Access

E-Commerce: Security and Applications

Ashraf Abdel-Karim Abu-Ein1, Hazem (Moh’d Said) Hatamleh2, Ahmed A.M. Sharadqeh1, As’ad Mahmoud Alnaser2 and Omar AlHeyasat1
  • 1 Department of Computer Engineering, Faculty of Engineering Technology, Al-Balqa Applied University, P.O. Box: 15008 Amman 11134, Jordan
  • 2 Department of Computer Science, Faculty of Ajlun, Al-Balqa Applied University, P.O. Box: 15008 Amman 11134, Jordan

Abstract

This study presents an investigation and comparing of all methods used in E-commerce security. Also it presents suggested methods to make e-commerce more secure. Applications of the E-commerce are demonstrated here. The efficiency of the security methods are measured and such efficiency increases as we combined more security methods with each other. A new method of security is suggested which is a combination between hash algorithm and Public Key Infrastructures (PKI). Index term-public Key Infrastructures (PKI), hash algorithm, E-commerce, security.

American Journal of Applied Sciences
Volume 9 No. 11, 2012, 1868-1871

DOI: https://doi.org/10.3844/ajassp.2012.1868.1871

Submitted On: 21 April 2012 Published On: 5 September 2012

How to Cite: Abu-Ein, A. A., Hatamleh, H. (. S., Sharadqeh, A. A., Alnaser, A. M. & AlHeyasat, O. (2012). E-Commerce: Security and Applications. American Journal of Applied Sciences, 9(11), 1868-1871. https://doi.org/10.3844/ajassp.2012.1868.1871

  • 3,022 Views
  • 3,286 Downloads
  • 0 Citations

Download

Keywords

  • Public Key Infrastructures (PKI)
  • Efficiency Increases
  • Security is Suggested
  • E-Commerce Emonstrated Security Methods
  • Combined More
  • Commerce Security