The Analysis of Foreign and Domestic E-Commerce Security Technology

Article Preview

Abstract:

The demands of safety in the e-commerce based on the Internet was discussed in the paper. And it started from the threats that e-commerce faced. And then some technology used to reinforce the safety of the e-commerce was described, including the safety demands of e-commerce, the safety of network. Some safety technology were discussed such as the encryption technology,the authentication and the safety protocol etc.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 926-930)

Pages:

2284-2288

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Gary p · Schneider. E-commerce [m]. Beijing: China machine press, (2008).

Google Scholar

[2] MingHua Liu, ZhiKao Ren, HongCan Dong. Research on Web-based security model of e-commerce security. Information network security [j], 2009, 100 (4): 33-35. In Chinese.

Google Scholar

[3] Shuliang Jia, XinGuo Fan. E-commerce security analysis [j]. Journal of Liaoning University of engineering and technology, 2009, 25 (3): 83-85. In Chinese.

Google Scholar

[4] H. M. Deitel. E-Business and e-Commerce for Managers[j]. Prentice Hall, 2001, 23-30.

Google Scholar

[5] QingLi Zhang. Research on e-commerce security strategy [d]. Henan University Master's degree thesis, 2012. In Chinese.

Google Scholar

[6] Kimery, K. M. & McCord, M. (2006). Signals of trustworthiness in e-commerce: Consumer understanding of third-party assurance seals. Journal of ElectronicCommerce in rganizations, 4(4), 52-74.

DOI: 10.4018/jeco.2006100103

Google Scholar

[7] Kim, D. J, Ferrin, D. L, and Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision SupportSystems, 44, 544-564.

DOI: 10.1016/j.dss.2007.07.001

Google Scholar

[8] Bing Han. Practical application of firewall technology in network security [j]. Information technology, 2010(01). In Chinese.

Google Scholar

[9] HaiPing Cao. Online banking authentication based on secure electronic transaction protocol (SET), [j]. Computer system, 2006 (6): 58-60. In Chinese.

Google Scholar

[10] Roger Grimes. E-commerce in Crisis :When SSL Isn't Safe.Info World,2006. 28(18) :26-28.

Google Scholar