Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In recent years, electronic commerce has maintained stable and rapid development in our country. Electronic payment instrument is the product of the development of electronic commerce. Compared with developed countries, the hardware equipment of electronic commerce payment instrument in China is still relatively backward, and technology of payment security still needs to be improved. This paper mainly...
With the development of Internet, e-commerce, with its advantages of high efficiency and low cost, has become important business mode. But security has always been one of the largest barriers to e-commerce. This paper analyzes the security technology of E-commerce system, and proposes a secure model to improve e-commerce system.
Many e-commerce applications are prevalent in today's world. New features and enhanced security, both are required for successful launch and deployment of e-commerce applications. In this paper, we focus on a generic e-commerce architecture, called eTRON which incorporates - at its nucleus - the tamper-resistant eTRON chip, equipped with functions for mutual authentication, secure communication, and...
As we know, the communication networks were first designed for voice communication purposes. Further developments within the communication networks made it possible to send or transmit data as well. When the public network is used as a bearer for data which need high security, e.g. payment, shopping, police telecommunication or mobile betting, there is a possibility that an attacker might capture...
SOA provides an effective way for electronic commerce. On the basis of studying generic business and SOA security mechanisms, this paper points out the inadequacies of current electronic commerce system and gives out a electronic commerce security model based on SOA. It can provide a secure, compatible and extensible application for business process.
Electronic commerce protocols are the basis of security in electronic commerce. Therefore, it is essential to ensure these protocols correctly. However, most current protocol analysis methods can only be used to analyze part of properties required by electronic commerce protocols. Rubin logic is a good method for analyzing security protocols. Rubin logic has been extended to analyze electronic commerce...
Proposes an integrated security framework based on the security demands of business applications on mobile network. Features of the framework includes: (1) supports various mobile communication protocols, and can automatically switch to the most appropriate security channel in according with link status and user demands, (2) provides multi-element authentication mechanism to reduce the risk of terminal...
In response to the low efficiency problem in the existing authenticated key exchange protocol for mobile commerce, the paper proposes an efficient authenticated key exchange protocol based on token, which can authenticate identity of the mobile user in the foremost time, as well as the session key can be exchanged efficiently. To analyze the proposed protocol, the paper proposes an extension of the...
Mobile agents have been proposed as a distributed programming model for large-scale distributed systems. The model is appealing as a response to many of the challenges in today's large scale distributed environments: efficiency, heterogeneity, autonomy, etc. Electronic commerce, data mining, and network management are examples of applications domains. Though the model is very well understood by industrial...
Electronic commerce protocols are the basis of security in electronic commerce. Therefore, it is essential to ensure these protocols correctly. However, most current protocol analysis methods can only be used to analyze part of properties required by electronic commerce protocols. Rubin logic is a good method for analyzing security protocols. Considered the properties of electronic commerce protocols,...
The secure payment gateway is necessary for ensuring the development of e-commerce. The breaking down of hash algorithm of MD5 and the like have imposed great potential security hazard on payment gateway. We have brought forward a kind of solution for enhancing the security of payment gateway and expounded the major key technique for security enhancing centering on the payment protocol which blends...
Chinapsilas E-business is still in its infancy and the limitation of financial system has still restricted the development of trans-border transactions. We need to promote more infrastructure construction, and then the E-business can enter the real era of transaction. The electronic payment is the key stage of the E-business and the basis of its development. This paper starts with various payment...
Along with the rapid development of electronic commerce and the increasing Internet users, the market of electronic auction has expanded. However, online auction centers remain to be an insecure environment and the bidderspsila identities and private information may still be under threat by malicious hackers. To consider account security, among the main rules of online electronic auction is that the...
Many of the current mobile commerce applications and services suffer from several security leakage problems. A consequent exploitation of biometric identifiers (such as human voice) integrated into multimedia processing techniques may turn out to be a viable solution to these problems. In this paper we demonstrate how digital watermarking techniques and authentication protocols can efficiently be...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.