2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) 2014
DOI: 10.1109/iccicct.2014.6993040
|View full text |Cite
|
Sign up to set email alerts
|

A model to secure e-commerce transaction using hybrid encryption

Abstract: The essential part of e-commerce is its data in the database. The issues associated with the security in the database of traditional e-commerce on the basis of analysis on the process of users registration and retrieving password are explained. Security of ecommerce system by single encryption technique is difficult to ensure. The technologies like asymmetrical encryption and symmetrical encryption were introduced to forward the combining thought to produce a hybrid encryption. The method so developed is used … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…As a traditional and effective data protection manner, encryption technology is widely used to achieve the goal of privacy-aware data collaborations, such as the symmetric key-driven data protection [6] and asymmetric key-driven data protection [36]. However, the heavy data preprocessing and communication costs narrow the application scope of encryption considerably.…”
Section: B Collaboration With Privacy-preservationmentioning
confidence: 99%
“…As a traditional and effective data protection manner, encryption technology is widely used to achieve the goal of privacy-aware data collaborations, such as the symmetric key-driven data protection [6] and asymmetric key-driven data protection [36]. However, the heavy data preprocessing and communication costs narrow the application scope of encryption considerably.…”
Section: B Collaboration With Privacy-preservationmentioning
confidence: 99%
“…The author mentioned that the reason for implementing RSA was because the scheme was faster, and had simple encryption and verification processes. Solanki and Shiwani (2014) proposed an extremely large number that had two prime factors (similar to RSA). DES symmetric encryption was implemented to encrypt/decrypt data.…”
Section: Hybrid Security Approach In Fog Computing Biometric and Smamentioning
confidence: 99%