The Research of Electronic Payment Platform Based on Public Key Infrastructure

2013 ◽  
Vol 748 ◽  
pp. 953-957
Author(s):  
Jing Song Tian ◽  
Xiao Qin Wu ◽  
Rong Hu

with the network intelligent development, the technique widely application brings huge convenient for peoples life and work. The network openness exist great hidden troubles along with the information security. Based on the security system of public key infrastructure, we can determine the users information security and completion through the method of providing secret keys and certificate managing by both sides. Through the research of public key infrastructure, we can design out the planning of electronic payment platform and apply it in the practical society. This is the most important point that network staff and electronic commerce works are searching.

2017 ◽  
Author(s):  
C. Bradford Biddle

The argument goes something like this: Internet commerce is hampered by the authentication problem. There is no reliable way to ensure that the sender of an electronic transmission is in fact who they purport to be. Digital signatures, supported by a “public key infrastructure” of certification authorities (CAs) and certificate databases, can solve this authentication problem. CAs will not emerge under the current legal regime, however, because they face uncertain and potentially immense liability exposure. Additionally, the legal status of digitally signed documents is unclear. Therefore, legislation is needed which defines and limits CA liability and which establishes the legality of digitally signed documents. Such legislation will solve the authentication problem and result in robust Internet commerce.


Author(s):  
Sapna Tyagi ◽  
Preeti Sirohi ◽  
Mohammad Yahiya Khan ◽  
Ashraf Darwish

The presented chapter elaborates fundamentals issues in information security, safety, and trust in industrial settings. The chapter introduces basics of information security that includes confidentially, integrity, and availability (CIA), which are some of the essential ingredients of information security. The chapter also discusses various reasons for security loop-holes prevalent in industrial setting. A majority of the chapter focuses on security framework and control implementation, which includes various authorizations and authentication methods. The shared secret systems, passwords, token systems, public key infrastructure (PKI), and biometrics system are most common methods used for authentication.


Author(s):  
Ali Saleh Al Najjar

Absolute protection is a difficult issue to maintain the confidentiality of images through their transmission over open channels such as internet or networks and is a major concern in the media, so image Cryptography becomes an area of attraction and interest of research in the field of information security. The paper will offer proposed system that provides a special kinds of image Encryption image security, Cryptography using RSA algorithm for encrypted images by HEX function to extract HEX Code and using RSA public key algorithm, to generate cipher image text. This approach provides high security and it will be suitable for secured transmission of images over the networks or Internet.


Sign in / Sign up

Export Citation Format

Share Document