E-Commerce: Security and Applications
- 1 Al-Balqa Applied University, Jordan
Copyright: © 2020 Ashraf Abdel-Karim Abu-Ein, Hazem (Moh’d Said) Hatamleh, Ahmed A.M. Sharadqeh, As’ad Mahmoud Alnaser and Omar AlHeyasat. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
This study presents an investigation and comparing of all methods used in E-commerce security. Also it presents suggested methods to make e-commerce more secure. Applications of the E-commerce are demonstrated here. The efficiency of the security methods are measured and such efficiency increases as we combined more security methods with each other. A new method of security is suggested which is a combination between hash algorithm and Public Key Infrastructures (PKI). Index term-public Key Infrastructures (PKI), hash algorithm, E-commerce, security.
- 1,342 Views
- 2,535 Downloads
- 0 Citations
- Public Key Infrastructures (PKI)
- Efficiency Increases
- Security is Suggested
- E-Commerce Emonstrated Security Methods
- Combined More
- Commerce Security