The Security Study of an EC Protocol Based on Casper/FDR2

2014 ◽  
Vol 681 ◽  
pp. 249-252
Author(s):  
Fang Wang

Researchers have proposed several security protocols to protect the electronic commerce security in these years; however, not all of them are secure enough. This article extends model checking method with Casper/FDR2 to model and analyze a new electronic protocol. Attacks are found in the protocol and their mechanisms are discussed. A variety of solutions are given to different security flaws. The improved protocol is proven to be robust and secure.

Author(s):  
Alessandro Armando ◽  
Giancarlo Pellegrino ◽  
Roberto Carbone ◽  
Alessio Merlo ◽  
Davide Balzarotti

Author(s):  
Mei Zhang ◽  
Huan Liu ◽  
Jinghua Wen

Rapid development of e-commerce and mobile communication opens a new era of big data. In this article, the authors put big data and e-commerce security together. They construct electronic commerce security system from these aspects: the creation of database, the security of information storage, the mining of information based on big data environment thoroughly. The second-generation product distributed platform- Apache Hadoop which is more popular and instant has been brought in. what's more, this article expounds the structure and working process. On the base of this platform, this article analyses the certainty and security of e-commerce transactions data developed on the condition of big data. It puts forward a construction view that people should guide and monitor the behavior of e-commerce, and improve the security system of electronic commerce on the base of data.


2014 ◽  
Vol 971-973 ◽  
pp. 1924-1927
Author(s):  
Si Wen Guo

with the popularity of electronic commerce, its security problem is more and more attention. As unsafe incidents occurred frequently, people for the security of e-commerce is becoming more and more attention. E-commerce security is a core and the key problem of e-commerce development, the development of efficient and safe electronic commerce management system is very necessary. According to the electronic commerce security architecture, this paper studies and analyzes the network service layer, layer encryption technology, security authentication, transaction protocol layer, potential danger in business system and so on various layers and safety technology, according to the security of the encrypted data and the data transmission performance problems, applying the appropriate encryption algorithm to improve the security and speed of the system.


2008 ◽  
Vol 40 (3-4) ◽  
pp. 91-99 ◽  
Author(s):  
Llanos Tobarra ◽  
Diego Cazorla ◽  
Fernando Cuartero ◽  
Gregorio Díaz ◽  
Emilia Cambronero

Sign in / Sign up

Export Citation Format

Share Document