CFP last date
20 March 2025
Call for Paper
April Edition
IJCA solicits high quality original research papers for the upcoming April edition of the journal. The last date of research paper submission is 20 March 2025

Submit your paper
Know more
Reseach Article

Authentication Approaches for E-Commerce Transactions: An Overview

Published on February 2013 by Usha Nandwani, Sangita Chaudhari
International Conference on Recent Trends in Information Technology and Computer Science 2012
Foundation of Computer Science USA
ICRTITCS2012 - Number 4
February 2013
Authors: Usha Nandwani, Sangita Chaudhari

Usha Nandwani, Sangita Chaudhari . Authentication Approaches for E-Commerce Transactions: An Overview. International Conference on Recent Trends in Information Technology and Computer Science 2012. ICRTITCS2012, 4 (February 2013), 38-42.

@article{
author = { Usha Nandwani, Sangita Chaudhari },
title = { Authentication Approaches for E-Commerce Transactions: An Overview },
journal = { International Conference on Recent Trends in Information Technology and Computer Science 2012 },
issue_date = { February 2013 },
volume = { ICRTITCS2012 },
number = { 4 },
month = { February },
year = { 2013 },
issn = 0975-8887,
pages = { 38-42 },
numpages = 5,
url = { /proceedings/icrtitcs2012/number4/10274-1371/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Recent Trends in Information Technology and Computer Science 2012
%A Usha Nandwani
%A Sangita Chaudhari
%T Authentication Approaches for E-Commerce Transactions: An Overview
%J International Conference on Recent Trends in Information Technology and Computer Science 2012
%@ 0975-8887
%V ICRTITCS2012
%N 4
%P 38-42
%D 2013
%I International Journal of Computer Applications
Abstract

Mostly we use password for Remote Authentication but Smart Card- based scheme is very promising and practical solution to remote authentication. Over the past several years, Smart Cards have achieved a growing acceptance as a powerful tool for Security, Identification and Authorization. Smart Cards have been widely used as simple token hardware in authentication process. As the e-business is growing rapidly via the internet, many organizations are implementing all the infrastructures that allow them to have secure e-business transactions. In this paper we study what is e-business, threats for e-business, security requirements for e-business and various authentication approaches for e-commerce transactions that allow partners to realize secure transactions.

References
  1. Fourar-Laidi, H. , "A smart card based framework for securing e-business transactions in distributed systems. ", Journal of King Saud University – Computer and Information Sciences (2012), 2012. 05. 002, pp. 1-5.
  2. Sathiyamoorthy, E. , Narayana Iyenger, N. , Ramachandran, V. , "Agent based trust management framework in distributed e-business environment", International journal of computer science & information technology(IJCSIT), Vol. 2. , No. 1, February 2010. pp. 14-28.
  3. Theodosios, T. , George, S. , George, P. , "Considerations of Public Key Infrastructure (PKI), Functioning as a Chain of Trust in Electronic Payments Systems", International Journal of Information and Communication Engineering 2:5 2006, pp. 330-337
  4. Wang, C. , Yanli, F. , "Model Based Security Policy Assessment for E-Business Environment", Proceedings of the Second Symposium International Computer Science and Computational Technology(ISCSCT '09) Huangshan, P. R. China, 26-28, Dec. 2009, pp. 088-093
  5. Eben, O. , "A Systematic Approach to e-Business Security", University of New Brunswick, Fredericton, Canada. 2001,.
  6. Srinivasan, S. , "Role of trust in e-Business success," Information Management and Computer Security, Vol. 12, No. 1, 2004, pp. 66-72
  7. A Healthcare CFO's Guide To Smart Card Technology And Applications 2/09 "The Smart Card Alliance", card Logix Corporation," smart card & security basics"
  8. M. Henderson, R. Coulter, "Modelling Trust Structure for Public Key Infrastructure", ACISP 2002, Lecture Notes in Computer Science Col 2384, 2002, pp. 55-70
  9. S. Gritzalis, D. Gritzalis, "A Digital Seal solution for deploying Trust on Commercial Transactions", Information Management and Computer Security, Vol. 9, No. 2, 2001, pp. 71-79
  10. Rivest, R. et al. , "A method for obtaining digital signatures and public-key cryptosystems". 1978. Communication of the ACM 21 (2), 120–126.
Index Terms

Computer Science
Information Sciences

Keywords

Card Secure E-business Transaction Pki Integrity Authentication Internet Policy Based Repudiation Based