Research on Electronic Cash Security Technology in Electronic Commerce

2013 ◽  
Vol 846-847 ◽  
pp. 1628-1631
Author(s):  
Song Jie Gong ◽  
Lin Di Jin

With the rapid development of electronic commerce, payment is becoming the focus problem of electronic commerce. Electronic cash has become the ideal method of electronic payment for it is able to realize fair, secure, effect electronic transacts. Along with electronic commerce development, electronic cash payment systems are also gradually developing. However, most electronic cashes are facing the security issues. Moreover, the amount of money each electronic cash card contains is fixed at issuance and is available only within a specified system. The key technology is digital signature technology, including blind signature, group signature, and ring signature. The paper researches the security problems of electronic cash in information safety and e-commerce, and discusses the electronic payment and the security problem, which is regarded as the foundation of electronic commerce. The main factors are given that causes security problems of electronic payment, and suggests corresponding precautionary measures.

2013 ◽  
Vol 816-817 ◽  
pp. 962-966
Author(s):  
Jing Feng Ai

The rapid development of electronic financial services, attendant come an increasingly serious network security problem, especially electronic cash exchange network security issues facing the urgent need to resolve. In this paper, electronic cash scheme detailed research and analysis, and then design a secure electronic cash system based on an improved theory of electronic cash scheme, it includes detailed electronic payment requirements analysis, system design, e-commerce payment system design, server design and client design. Finance and electronics industry combining electronic financial system, if they can effectively solve the security issues, I believe it can be quickly developed.


2014 ◽  
Vol 971-973 ◽  
pp. 1684-1687
Author(s):  
Xiu Juan Sun

this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.


2013 ◽  
Vol 22 (2) ◽  
pp. 95-110 ◽  
Author(s):  
Haiyong Bao ◽  
Zhenfu Cao

AbstractProxy signature and group signature are two basic cryptographic primitives. Due to their valuable characteristics, many schemes have been put forward independently and they have been applied in many practical scenarios up to the present. However, with the development of electronic commerce, many special requirements come into being. In this article, we put forward the concept of group–proxy signature, which integrates the merits of proxy signature and group signature for the first time. We also demonstrate how to apply our scheme to construct an electronic cash system. The space, time, and communication complexities of the relevant parameters and processing procedures are independent of group size. Our demonstration of the concrete group–proxy signature scheme shows that the concepts brought forward by us are sure to elicit much consideration in the future.


Author(s):  
Yin Shiyong ◽  
Jin song Bao ◽  
Zhang Yiming ◽  
Huang Xiaodi

As the core of intelligent manufacturing, CPS has serious security issues, especially for the communication security of its terminal M2M. In this paper, blockchain technology is introduced to address such a security problem of communications between different types of machines in CPS. According to the principles of blockchain technology, we design a blockchain for secure M2M communications. As a communication system of M2M consists of public network areas, equipment areas and private areas, we design a sophisticated blockchain structure between the public area and private area. For validating our design, we take cotton spinning production as a case study to demonstrate our solution to M2M communication problems under the CPS framework.


2016 ◽  
Vol 3 (1) ◽  
pp. 42
Author(s):  
Quanhui Ren ◽  
Hui Gao

<span style="color: black; line-height: 115%; font-family: 'Calibri','sans-serif'; font-size: 12pt; mso-fareast-font-family: Calibri; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">In order to adapt to rapid development of network information technology, the application of cloud computing technology is increasingly widespread. However, the security problem in the cloud computing environment has not been effectively resolved. Currently, the research on this problem is getting more attention from the industry. In order to further investigate the information security issues of cloud computing environment, this article not only discusses the basic concept, characteristics and service model of cloud computing, but also focuses on the cloud computing security reference model and cloud cube model. In this paper, the information security problems and concrete solutions in the former cloud computing environment are discussed from different aspects.</span>


Author(s):  
Horea Oros ◽  
Constantin Popescu

An electronic cash system allows the exchange of digital coins with value assured by the bank’s signature and with concealed user identity. In an electronic cash system, a user can withdraw coins from the bank and then spends each coin anonymously and unlinkably. In this paper we propose a secure and efficient off-line electronic payment system based on bilinear pairings and group signature schemes. The anonymity of the customer is revocable by a trustee in case of a dispute. Because the amount of communication in the payment protocol is about 480 bits, the proposed off-line electronic payment system can be used in wireless networks with limited bandwidth.


2014 ◽  
Vol 989-994 ◽  
pp. 4533-4537
Author(s):  
Yan Li Li

This paper expounds the concept of art electronic commerce, analyzes the connotation of art e-commerce, and introduces some related security technology from security problems in e-commerce transactions so as to effectively eliminate safety troubles in e-commerce activities, guide and promote healthy and rapid development of art electronic commerce in our country.


2014 ◽  
Vol 989-994 ◽  
pp. 4314-4317 ◽  
Author(s):  
Song Jie Gong ◽  
Li Ping Zeng

Electronic commerce system is now developing at a huge speed, whose final objective is to electronize every phase of commercial activity. Electronic payment is the heart of electronic commerce. Along with electronic commerce development, electronic cash payment systems are also developing. How to achieve safe electronic transactions is the key to the development of electronic cash payment systems. There are two kinds of electronic cash system, on-line and off-line. As the security and effective electronic payment system has become an important part of electronic commerce, according to the new character of cloud computing, it can solve the problems that the electronic cash systems exist leakage of privacy, non-standard transactions and high cost in the traditional network. The paper describes the types of electronic payment and discusses the electronic cash payment safety based on cloud computing. The presented solution can reduce the hardware and software systems cost, particularly for the current electronic commerce security, with efficient and convenient interactive response to the trend.


Author(s):  
Priya Yadav ◽  
Pranjeet Das ◽  
Ravi Kumar Malhotra

E-commerce is process of doing business through computer networks. Advances in wireless network technology and the continuously increasing number of users of mobile latter on make an ideal platform for offering various high utilityservices in just a snap of a finger to the mobile users and give pace to the rapid development of E-Commerce in India.E-commerce is considered an excellent alternative for companies to reach new customersbut the fact that has hindered the growth of e-commerce is security. Security is the challenge facing e-commerce today and there is still a lot of advancement made in the field of securityfor increasing the use of e-commerce in developing countries the B2B e-commerce is implemented for improving access to global markets for firms in developing countries. With the special characteristics and constraints of mobile terminals and wireless networks and the context, situations and circumstances that people use their hand-held terminalswhich will ultimately fuel explosive ecommerce growth in India This paper highlights the various key challenges and opportunities which Indian e-commerce industry may face in the upcoming years. And also discuss challenges in electronic commerce transactions.


Symmetry ◽  
2019 ◽  
Vol 11 (2) ◽  
pp. 215 ◽  
Author(s):  
Yu Yang ◽  
Bichen Che ◽  
Yang Zeng ◽  
Yang Cheng ◽  
Chenyang Li

With the rapid development and widespread applications of Internet of Things (IoT) systems, the corresponding security issues are getting more and more serious. This paper proposes a multistage asymmetric information attack and defense model (MAIAD) for IoT systems. Under the premise of asymmetric information, MAIAD extends the single-stage game model with dynamic and evolutionary game theory. By quantifying the benefits for both the attack and defense, MAIAD can determine the optimal defense strategy for IoT systems. Simulation results show that the model can select the optimal security defense strategy for various IoT systems.


Sign in / Sign up

Export Citation Format

Share Document