Research Article Open Access

E-Commerce: Security and Applications

As’ad Mahmoud Alnaser1, Ahmed A.M. Sharadqeh2, Hazem (Moh’d Said) Hatamleh1, Ashraf Abdel-Karim Abu-Ein2 and Omar AlHeyasat2
  • 1 Department of Computer Science, Faculty of Ajlun, Al-Balqa Applied University, P.O. Box: 15008 Amman 11134, Jordan
  • 2 Department of Computer Engineering, Faculty of Engineering Technology, Al-Balqa Applied University, P.O. Box: 15008 Amman 11134, Jordan


This study presents an investigation and comparing of all methods used in E-commerce security. Also it presents suggested methods to make e-commerce more secure. Applications of the E-commerce are demonstrated here. The efficiency of the security methods are measured and such efficiency increases as we combined more security methods with each other. A new method of security is suggested which is a combination between hash algorithm and Public Key Infrastructures (PKI). Index term-public Key Infrastructures (PKI), hash algorithm, E-commerce, security.

American Journal of Applied Sciences
Volume 9 No. 11, 2012, 1868-1871


Submitted On: 21 April 2012 Published On: 5 September 2012

How to Cite: Alnaser, A. M., Sharadqeh, A. A., Hatamleh, H. (. S., Abu-Ein, A. A. & AlHeyasat, O. (2012). E-Commerce: Security and Applications. American Journal of Applied Sciences, 9(11), 1868-1871.

  • 0 Citations



  • Public Key Infrastructures (PKI)
  • Efficiency Increases
  • Security is Suggested
  • E-Commerce Emonstrated Security Methods
  • Combined More
  • Commerce Security