@article {10.3844/ajassp.2012.1868.1871, article_type = {journal}, title = {E-Commerce: Security and Applications}, author = {Abu-Ein, Ashraf Abdel-Karim and Hatamleh, Hazem (Moh’d Said) and Sharadqeh, Ahmed A.M. and Alnaser, As’ad Mahmoud and AlHeyasat, Omar}, volume = {9}, year = {2012}, month = {Sep}, pages = {1868-1871}, doi = {10.3844/ajassp.2012.1868.1871}, url = {https://thescipub.com/abstract/ajassp.2012.1868.1871}, abstract = {This study presents an investigation and comparing of all methods used in E-commerce security. Also it presents suggested methods to make e-commerce more secure. Applications of the E-commerce are demonstrated here. The efficiency of the security methods are measured and such efficiency increases as we combined more security methods with each other. A new method of security is suggested which is a combination between hash algorithm and Public Key Infrastructures (PKI). Index term-public Key Infrastructures (PKI), hash algorithm, E-commerce, security.}, journal = {American Journal of Applied Sciences}, publisher = {Science Publications} }