The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a notion of contract signatures used in e-commerce applications. This scheme adopts digital multi-signature scheme in public-key cryptography to facilitate fair signature exchange over network. Security proof under the random oracle model of this modified signature scheme is include. This proposed solution allows two parties to produce and exchange two ambiguous signatures...
Financial payment via mobile phones, mobile payment, is one of the newest technologies in ICT domain which have been received many attentions by researchers in recent years. In this technology there is no need to use additional equipments such as pos devices. This system can be used in any application increasing human life level, including healthcare. However, mobile payment as a subset of electronic...
With the development of Electronic commerce, more and more transactions on information goods or services have been or will be conducted through the Internet, which involve small value payment that called micro-payment. Therefore, micro-payment is one of the most popular research aspects with focus on the field of electronic payment. Many efficient micro-payment schemes were proposed based on PayWord...
With the rapid development of e-commerce, security issues are arising from people's attention. The security of the transaction is the core and key issues of the development of e-commerce. This paper about the security issues of e-commerce activities put forward solution strategy from two aspects that are technology and system, so as to improve the environment for the development of E-commerce and...
The communication technology developed into the electronic commerce using the radio communication through the electronic commerce using the wired network. The electronic authentication system technology based PKI was developed in order to guarantee the stability of this kind of the electronic commerce. but The effectiveness decreases because the mobile terminal makes the low capacity, and the low...
The electronic commerce is studied from the security issue. Based on the relationships of e-commerce security and computer network security, an e-commerce security model is presented. Then aiming at the different application environments of B2B, B2C and C2C, the research status and existing problems of the e-commerce security support technologies are reviewed. Finally, the further researches are suggested.
Proxy authorization signature is essential to electronic commerce and other electronic transaction. This paper analyzed the security threats of present proxy authorization signatures and the basic principles of proxy signature together with its superiority in electronic transaction application. We present a conditionally anonymous proxy authorization signature scheme with forward security. The identity...
The paper analyzed the basic principles of blind signature and its application in designing and analyzing digital fingerprint schemes. Combining blind signature and anonymous fingerprint, we present a digital fingerprint scheme with conditional anonymity based on ECC (elliptic curves cryptosystem). The identity blinding and probabilistic encryption algorithm enable the buyer to be conditionally anonymous...
Agent technology is used in e-commerce security in the perspective of distributed artificial intelligence in the paper and is researched in combination with e-commerce security technology. A multi-agent e-commerce and security system with four-layer system structure, improved password tracking method and dynamic load function is put forward, designed and realized by using agent technologypsilas own...
Fair exchange and customerpsilas anonymity are the two important properties of any electronic commerce protocol. However most of the existing protocols have missed this focus and a few have any one of this but not both. This paper proposes a secure and efficient electronic commerce protocol that ensures fair exchange and customerpsilas anonymity for any digital transaction over the public network...
Mobile agent technology is going to play an important role in the future electronic commerce due to the characteristics of mobility and autonomy of the agents. Therefore, security issues should be solved before we use this new technology. However, privacy protection of customers is seldom considered. In this paper, we focus on the privacy protection of customers. Moreover, we improve our scheme more...
OT (oblivious transfer) is an important e-commerce technique to make information buyers be able to get desired information and preserve privacy at the sametime. Recently, Kim et al. proposed two 1-out-of-2 NIOT (non-interactive OT) schemes. They claimed the message sender can be verified in their schemes. Unfortunately, their schemes are insecure. In this paper, we will make thorough discussions on...
The electronic payment systems are gradually used after the electronic commerce was in fashion. However, the electronic cash (E-cash) in every electronic payment system cannot be circulated to other e-cash systems. In addition, the e-cash usually presents a fixed amount of money and should be used the whole amount in a trade. It is difficult to have the change back when the purchase price is lower...
Electronic auction allows bidders to bid for diverse sold objects under an electronic platform via Internet. Recently, Liaw et al. proposed an electronic online bidding auction protocol with both security and efficiency. However, we find some controversies in Liaw et al.'s scheme and then a new electronic auction protocol will be proposed to solve these controversies in this paper. In the proposed...
In this paper, a new digital payment system based on an ID-based blind signature scheme is presented. Blind signatures represent one cryptographic primitive tailored for applications where anonymity of the participants is an important requirement for instance in electronic commerce, in particular for payment systems. Since anonymity could be in conflict with law enforcement, for instance in cases...
Nenadic etc(2004,2005) proposed RSA-CEGD protocol for certified e-goods delivery to guarantee strong fairness with the help of transparent Semi-Trust Third Party. Alcaide, Juan, etc(2005) pointed out it is vulnerable for replay attack and the NRO message can be abused. In this paper, we illustrate the STTP can not verify the message submitted by initiator which results in unfairness. In order to implement...
The presented mobile DRM are short of an efficient payment protocol to guarantee that participants can engage in the exchange without the risk of suffering a disadvantage. Even the latest DRM standard of the open mobile alliance (OMA) did not give a detailed transaction scheme in mobile DRM. In general, the fair payment approaches in mobile DRM rely on the service of an external trusted third party...
As the development of online commercial transactions, the transactions that involve small amount of money are becoming popular. However, the existing micropayment systems are either not efficient enough for micropayment or too complicated and expensive for extensive application. A new credit based micropayment scheme is proposed in this paper. With only reasonable security performance, the efficiency...
Speeding up subsequent negotiations between the same negotiators is a problem worth of research in the area of trust negotiation. Based on the analysis of trust-X, this paper proposes an improved approach towards the model of trust-X. The improved model introduces the concept of visiting card to identify every entity in an open system, and records the credentials that the counterpart disclosed during...
In response to the low efficiency problem in the existing authenticated key exchange protocol for mobile commerce, the paper proposes an efficient authenticated key exchange protocol based on token, which can authenticate identity of the mobile user in the foremost time, as well as the session key can be exchanged efficiently. To analyze the proposed protocol, the paper proposes an extension of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.