Cryptography security in Online Transaction- A Current Scenario
International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)
Download this PDF format
Abstract
Online transaction is a powerful tool for business expedition that allows different companies to increase their sale through reaching new market and improve customer service. Here people are not interacting directly but rather then they are interacting through electronically therefore business requires coherent ,consistent environment for online transaction. The objective of this paper is to explain the importance of online transaction security and different aspects of it. This research paper presented different ways have presented that increases security level using cryptographic techniques.
References
[1] Thomas L. Mesenbourg, “An Introduction to E-commerce”, Philippines: DAI-AGILE, 2000
[2] Khalid Haseeb, Dr. Muhammad Arshad, Shoukat ali and Dr. Shazia Yasin “ Secure E- commerce Protocol”, International Journal of Computer Science and Security (IJCSS), Vol. 5 No. 1, pp.742-751, April 2011
[3]D. Berlin, "Information SecurityPerspective on Intranet," presented at Internet and E- Commerce Infrastructure, 2007.
[4] S. R. S. KESH, AND S. NERUR, "A Framework for Analyzing E-Commerce Security," Information Management and Computer Security, vol. 10, no. 4, no. pp. 149-158.
[5] Joel Weise, “Public Key Infrastructure”, SunPSSM Global Security Practice Sun BluePrints™ OnLine August 2001
[6] An Introduction to Cryptography (found in the documentation of PGP® Desktop 8.1). Page 17. June 2004.
[7]Jagdev Singh Kaleka, “E-Commerce: Authentication & Security on Internet”, Deptt. of Technical Education and Industrial Training, Govt. of Punjab
[8] Cetin K. Koc, "Next Generation E-Commerce Security" Information Security Laboratory December 2, 1999
[9]Dale Barr, “Public Key Infrastructure”, TECHNOLOGY AND PROGRAMS DIVISION Volume 11, Number 3, December 2004 Visual Cryptography and Boolean Operation, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 4, No 2, July 2010..
[10] Khalid Haseeb, Dr. Muhammad Arshad, Shoukat ali and Dr. Shazia Yasin “ Secure E- commerce protocol”,International Journal of Computer Science and Security (IJCSS), Vol. 5 No. 1, pp.742-751, April 2011
Keywords
Third Party, Public Key Infrastructure, Certificate Authority, Digital Signature, Secure Socket layer