Sciweavers

289 search results - page 2 / 58
» A New Method to Security Electronic Commerce Protocol
Sort
View
ISW
2001
Springer
13 years 10 months ago
Suitability of a Classical Analysis Method for E-commerce Protocols
We present the adaptation of our model for the validation of key distribution and authentication protocols to address specific needs of protocols for electronic commerce. The two ...
Sigrid Gürgens, Javier Lopez
IPL
2006
85views more  IPL 2006»
13 years 5 months ago
A flaw in the electronic commerce protocol SET
The Secure Electronic Transaction (SET) protocol has been developed by the major credit card companies in association with some of the top software corporations to secure e-commer...
Srecko Brlek, Sardaouna Hamadou, John Mullins
CSIE
2009
IEEE
14 years 15 days ago
An Enhanced-Security Fair E-payment Protocol
Customers are usually passive in an electronic commerce transaction. Based on a new two times concurrent signature, this article presents a fair electronic payment (E-payment) pro...
Wei Fan, Huaying Shu, Elizabeth Fife, Qiang Yan
WER
2005
Springer
13 years 11 months ago
Requirement Elicitation Based on Goals with Security and Privacy Policies in Electronic Commerce
This paper describes a method for requirements elicitation based on goals for electronic commerce systems in agreement with security and privacy polices of the site. The method in...
Simara Vieira da Rocha, Zair Abdelouahab, Eduardo ...
ACMICEC
2008
ACM
253views ECommerce» more  ACMICEC 2008»
13 years 7 months ago
Secure and efficient protocol for mobile payments
Electronic Payments have gained tremendous popularity in the modern world. Credit/debit cards and online payments are in widespread use. Bringing electronic payments to the mobile...
Rahul M. Godbole, Alwyn R. Pais