Research Article Open Access

E-Commerce: Security and Applications

Ashraf Abdel-Karim Abu-Ein1, Hazem (Moh’d Said) Hatamleh1, Ahmed A.M. Sharadqeh1, As’ad Mahmoud Alnaser1 and Omar AlHeyasat1
  • 1 Al-Balqa Applied University, Jordan
American Journal of Applied Sciences
Volume 9 No. 11, 2012, 1868-1871

DOI: https://doi.org/10.3844/ajassp.2012.1868.1871

Submitted On: 21 April 2012 Published On: 5 September 2012

How to Cite: Abu-Ein, A. A., Hatamleh, H. (. S., Sharadqeh, A. A., Alnaser, A. M. & AlHeyasat, O. (2012). E-Commerce: Security and Applications. American Journal of Applied Sciences, 9(11), 1868-1871. https://doi.org/10.3844/ajassp.2012.1868.1871

Abstract

This study presents an investigation and comparing of all methods used in E-commerce security. Also it presents suggested methods to make e-commerce more secure. Applications of the E-commerce are demonstrated here. The efficiency of the security methods are measured and such efficiency increases as we combined more security methods with each other. A new method of security is suggested which is a combination between hash algorithm and Public Key Infrastructures (PKI). Index term-public Key Infrastructures (PKI), hash algorithm, E-commerce, security.

  • 1,342 Views
  • 2,535 Downloads
  • 0 Citations

Download

Keywords

  • Public Key Infrastructures (PKI)
  • Efficiency Increases
  • Security is Suggested
  • E-Commerce Emonstrated Security Methods
  • Combined More
  • Commerce Security