International Conference on Cyberspace Technology (CCT 2014) 2014
DOI: 10.1049/cp.2014.1289
|View full text |Cite
|
Sign up to set email alerts
|

A method based on MD5 and time for preventing deception in electronic commerce

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…The MD5 hash function can be used to enhance security, efficiency and prevent hacking and deception in many web applications such as e-commerce, content management system. The MD5 algorithm can also be used to prevent data forgery and maintain data integrity too in storage and data transmission [7]. It includes five steps through which the plain text can be converted into cipher text for data integrity and security [8].…”
Section: Introductionmentioning
confidence: 99%
“…The MD5 hash function can be used to enhance security, efficiency and prevent hacking and deception in many web applications such as e-commerce, content management system. The MD5 algorithm can also be used to prevent data forgery and maintain data integrity too in storage and data transmission [7]. It includes five steps through which the plain text can be converted into cipher text for data integrity and security [8].…”
Section: Introductionmentioning
confidence: 99%