CFP last date
20 December 2024
Reseach Article

Analysis of E-commerce security protocols SSL and SET

Published on May 2012 by Neetu Kawatra, Vijay Kumar
National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
Foundation of Computer Science USA
RTMC - Number 12
May 2012
Authors: Neetu Kawatra, Vijay Kumar
c6d0547e-e393-4709-b050-cc94174ef8b6

Neetu Kawatra, Vijay Kumar . Analysis of E-commerce security protocols SSL and SET. National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011. RTMC, 12 (May 2012), 36-40.

@article{
author = { Neetu Kawatra, Vijay Kumar },
title = { Analysis of E-commerce security protocols SSL and SET },
journal = { National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011 },
issue_date = { May 2012 },
volume = { RTMC },
number = { 12 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 36-40 },
numpages = 5,
url = { /proceedings/rtmc/number12/6713-1111/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%A Neetu Kawatra
%A Vijay Kumar
%T Analysis of E-commerce security protocols SSL and SET
%J National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%@ 0975-8887
%V RTMC
%N 12
%P 36-40
%D 2012
%I International Journal of Computer Applications
Abstract

Today is the era of information technology. E-commerce is the major achievement of this era. In E-commerce, the transaction takes place over the network. During various phases of an electronic transaction, the information such as product specification, order details, payment, and delivery information travels over the Internet. The transaction information transmitted over the public internet can be tapped, intercepted, diverted, modified and fabricated by an intruder trying to gain some benefit or cause damages to competing business. In this paper comparison of the two most popular E-commerce transactions secure protocols SSL and SET.

References
  1. Singh Sumanjeet, " Emergence Of Payment Systems In The Age Of Electronic Commerce: The State Of Art", Global Journal Of International Business Research Vol. 2. No. 2. 2009
  2. Levi A. , Koç C. (2001) 17th Annual Computer Security Applications Conference (ACSAC'01), 0286.
  3. Electronic Payment System- ISA 767 (2008) Secure Electronic Commerce George Mason University
  4. Anup K. Ghosh. Certifying E-Commerce Software For Security. National Institute For Standards And Technology (NIST), 1999.
  5. Asuman Dogac, Electronic Commerce. Journal Of Database Management, Fall 1999.
  6. Marcus J. Ranum. Electronic Commerce And Security. V-One Corporation, White Paper. Http://Www. V-One. Com
  7. Shannon Matthews. Survey Reveals Ecommerce Security Systems Are Not Convincing Internet Users. World Research Inc. Aug. 20, 1999. Http://Www. Techmall. Com
  8. Anup K. Ghosh. Securing Electronic Commerce: Moving Beyond Cryptography. Journal Of Electronic Commerce, 1999.
  9. "SET Secure Electronic Transaction LLC. " Purchase, NY: SET Secure Electronic Transaction LLC, 2001. Available From Www. Setco. Org
  10. Marcus Goncalves. Industrial Networks Are Not Ready For E-Commerce. ARC Insights, Issue: 99-023, March 1999.
  11. Mayu Mishina. Is electronic commerce a good idea for you? AS/400 Systems Management, July 1998. Netscape Corp. Appendix E, Introduction to SSL. Page 213-229.
  12. Taher Elgamal. The Secure Sockets Layer Protocol (SSL). Danvers IETF Meeting, April 1995.
  13. Nikos Drakos. Security & Electronic Commerce:SSL Protocol. Security & Electronic Commerce Appendix, University of Leeds. 1997.
  14. Marvin A. Sirbu. Credits and debits on the Internet. IEEE-Spectrum, Feb. 1997
Index Terms

Computer Science
Information Sciences

Keywords

Electronic Payment Ssl Set E-commerce