期刊文献+
共找到2,431篇文章
< 1 2 122 >
每页显示 20 50 100
Electronic Commerce Security and Risk Management: An Important Part of College Curriculum
1
作者 Yongchang Cai 《Journal of Educational Theory and Management》 2024年第1期18-22,共5页
With the rapid expansion of e-commerce,its security and risk management problems become increasingly prominent.In the current business environment,the ability to understand and apply e-commerce security and risk manag... With the rapid expansion of e-commerce,its security and risk management problems become increasingly prominent.In the current business environment,the ability to understand and apply e-commerce security and risk management has become an important criterion to measure a good person.Therefore,the importance of e-commerce security and risk management courses in college education is self-evident.This course can not only help students master the basic knowledge of e-commerce,but also enable them to understand how to deal with various risks in practical work and ensure the safe operation of e-commerce.At the same time,through the study of e-commerce security and risk management,students can better understand the operation mode and law of e-commerce,and lay a solid foundation for their future career.In general,e-commerce security and risk management occupy an important position in the curriculum of colleges and universities,and play a crucial role in cultivating e-commerce professionals with practical operation ability and innovative thinking. 展开更多
关键词 electronic commerce secure Risk management College curriculum
下载PDF
Fortifying Smart Grids: A Holistic Assessment Strategy against Cyber Attacks and Physical Threats for Intelligent Electronic Devices
2
作者 Yangrong Chen June Li +4 位作者 Yu Xia Ruiwen Zhang Lingling Li Xiaoyu Li Lin Ge 《Computers, Materials & Continua》 SCIE EI 2024年第8期2579-2609,共31页
Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control instructions.In the context of the heightene... Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control instructions.In the context of the heightened security challenges within smart grids,IEDs pose significant risks due to inherent hardware and software vulner-abilities,as well as the openness and vulnerability of communication protocols.Smart grid security,distinct from traditional internet security,mainly relies on monitoring network security events at the platform layer,lacking an effective assessment mechanism for IEDs.Hence,we incorporate considerations for both cyber-attacks and physical faults,presenting security assessment indicators and methods specifically tailored for IEDs.Initially,we outline the security monitoring technology for IEDs,considering the necessary data sources for their security assessment.Subsequently,we classify IEDs and establish a comprehensive security monitoring index system,incorporating factors such as running states,network traffic,and abnormal behaviors.This index system contains 18 indicators in 3 categories.Additionally,we elucidate quantitative methods for various indicators and propose a hybrid security assessment method known as GRCW-hybrid,combining grey relational analysis(GRA),analytic hierarchy process(AHP),and entropy weight method(EWM).According to the proposed assessment method,the security risk level of IEDs can be graded into 6 levels,namely 0,1,2,3,4,and 5.The higher the level,the greater the security risk.Finally,we assess and simulate 15 scenarios in 3 categories,which are based on monitoring indicators and real-world situations encountered by IEDs.The results show that calculated security risk level based on the proposed assessment method are consistent with actual simulation.Thus,the reasonableness and effectiveness of the proposed index system and assessment method are validated. 展开更多
关键词 Smart grid intelligent electronic device security assessment abnormal behaviors network traffic running states
下载PDF
Ensuring Information Security in Electronic Health Record System Using Cryptography and Cuckoo Search Algorithm
3
作者 Arkan Kh Shakr Sabonchi Zainab Hashim Obaid 《Journal of Information Hiding and Privacy Protection》 2023年第1期1-18,共18页
In the contemporary era,the abundant availability of health information through internet and mobile technology raises concerns.Safeguarding and maintaining the confidentiality of patients’medical data becomes paramou... In the contemporary era,the abundant availability of health information through internet and mobile technology raises concerns.Safeguarding and maintaining the confidentiality of patients’medical data becomes paramount when sharing such information with authorized healthcare providers.Although electronic patient records and the internet have facilitated the exchange of medical information among healthcare providers,concerns persist regarding the security of the data.The security of Electronic Health Record Systems(EHRS)can be improved by employing the Cuckoo Search Algorithm(CS),the SHA-256 algorithm,and the Elliptic Curve Cryptography(ECC),as proposed in this study.The suggested approach involves usingCS to generate the ECCprivate key,thereby enhancing the security of data storage in EHR.The study evaluates the proposed design by comparing encoding and decoding times with alternative techniques like ECC-GA-SHA-256.The research findings indicate that the proposed design achieves faster encoding and decoding times,completing 125 and 175 iterations,respectively.Furthermore,the proposed design surpasses other encoding techniques by exhibiting encoding and decoding times that are more than 15.17%faster.These results imply that the proposed design can significantly enhance the security and performance of EHRs.Through the utilization of CS,SHA-256,and ECC,this study presents promising methods for addressing the security challenges associated with EHRs. 展开更多
关键词 Information security electronic health record system CRYPTOGRAPHY cuckoo search algorithms
下载PDF
Secure Provenance of Electronic Records Based on Blockchain
4
作者 Qirun Wang Fujian Zhu +1 位作者 Sai Ji Yongjun Ren 《Computers, Materials & Continua》 SCIE EI 2020年第11期1753-1769,共17页
At present,the provenance of electronic records is stored centrally.The centralized way of information storage has huge risks.Whether the database itself is destroyed or the communication between the central database ... At present,the provenance of electronic records is stored centrally.The centralized way of information storage has huge risks.Whether the database itself is destroyed or the communication between the central database and the external interruption occurs,the provenance information of the stored electronic records will not play its role.At the same time,uncertainties such as fires and earthquakes will also pose a potential threat to centralized databases.Moreover,the existing security provenance model is not specifically designed for electronic records.In this paper,a security provenance model of electronic records is constructed based on PREMIS and METS.Firstly,this paper analyses the security requirements of the provenance information of electronic records.Then,based on the characteristics of blockchain decentralization,and combined with coding theory,a distributed secure provenance guarantees technology of electronic records is constructed,which ensures the authenticity,integrity,confidentiality and reliability of the provenance information. 展开更多
关键词 secure provenance electronic records blockchain
下载PDF
Impact of International Networks on Standardization Process in Banking Industry: Example of Secure Electronic Transaction (SET) Initiative
5
作者 Paul Marc Collin Hana Machkova 《Journal of Modern Accounting and Auditing》 2013年第11期1469-1482,共14页
The purpose of this article is to present and interpret the case study of the secure electronic transaction (SET) scheme of Internet security, as an illustration of the necessary construction of interoperability sol... The purpose of this article is to present and interpret the case study of the secure electronic transaction (SET) scheme of Internet security, as an illustration of the necessary construction of interoperability solutions for financial services. The interpretation of case data with actor network theory (ANT) provides an illustration of power coalitions among banks to create a de facto standard for transnational electronic payment security on the Internet. After a step of protecting its political interests and well-known technological solutions, the coalition understands that its mission becomes a matter of life and death for its members: Brand-new currency has been invented on the Web and one could develop business and monetary transactions without the banks. This interpretative stage tells us much about the transnational mechanisms of regulation and standardization as well as the "translation" steps regarding these transnational organizations. However, an additional step has to be added to this interpretative step, a step of framework construction. The aim is to help managers of the transnational firms involved in regulations and standardization to anticipate the evolutions and make relevant decisions. The framework has three distinctive characteristics: the ability to help conception, the ability to help conceive problems "ex ante", and the ability to facilitate collective conception of strategic maneuvers. 展开更多
关键词 cyber payments bank cards deterritorialization financial markets secure electronic transaction (SET)specification
下载PDF
Towards the Advancement of Cashless Transaction: A Security Analysis of Electronic Payment Systems
6
作者 Iffath Tanjim Moon Muhammad Shamsuzzaman +1 位作者 Muhammad Musfiqur Rahman Mridha Abu Sayed Md. Mostafizur Rahaman 《Journal of Computer and Communications》 2022年第7期103-129,共27页
In recent decades, day-to-day lifestyle requires online payments as easy and simple solutions to several financial transactions, which makes the concept of Electronic payment Systems very popular in the growth of a ca... In recent decades, day-to-day lifestyle requires online payments as easy and simple solutions to several financial transactions, which makes the concept of Electronic payment Systems very popular in the growth of a cashless society. In fact, cashless transactions through simple mobile apps are not merely a concept anymore rather are implemented robustly and being used extensively. On the dark side, obvious financial benefits are making these apps vulnerable to being attacked, which can be successful through security breaches. These cybersecurity issues need to be traced out and resolved to make the financial transactions through an app secure and trustworthy. In this paper, several related papers are analyzed to trace out possible cybersecurity issues in the domain of Electronic Transaction System. The objective is to establish sufficient theoretical background to propose methodologies for measuring security issues and also identify the security strength of any FinTech application and provide standard security metrics. 展开更多
关键词 Fintech Apps CYBERsecurITY Cashless Transaction Mobile Banking electronic payment
下载PDF
Fair Electronic Payment Scheme Based on DSA 被引量:1
7
作者 WANGShao-bin HONGFan ZHUXian 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期203-206,共4页
We present a multi-signature scheme based on DSA and describes a faireleetronic payment scheme based on improved DSA signatures. The scheme, makes both sides in e-qualpositions during the course of electronic transact... We present a multi-signature scheme based on DSA and describes a faireleetronic payment scheme based on improved DSA signatures. The scheme, makes both sides in e-qualpositions during the course of electronic transaction A Trusted Third Party (TTP)is involved in thescheme to guarantee the fairness of the scheme for both sides. However, only during the course ofregistration and dispute resolution will TTP be needed TTP is not needed during the normal paymentstage. 展开更多
关键词 fair electronic payment multi-signatures DSA signatures E-COMMERCE
下载PDF
An Application Expert System for Evaluating Effective Factors on Trust in B2C WebsitesTrust, Security, ANFIS, Fuzzy Logic, Rule Based Systems, Electronic Commerce 被引量:4
8
作者 Mehrbakhsh Nilashi Karamollah Bagherifard +2 位作者 Othman Ibrahim Nasim Janahmadi Mousa Barisami 《Engineering(科研)》 2011年第11期1063-1071,共9页
In new environments of trading, customer's trust is vital for the extended progress and development of electronic commerce. This paper proposes that in addition to known factors of electronic commerce B2C websites... In new environments of trading, customer's trust is vital for the extended progress and development of electronic commerce. This paper proposes that in addition to known factors of electronic commerce B2C websites such a design of websites, security of websites and familiarity of website influence customers trust in online transactions. This paper presents an application of expert system on trust in electronic commerce. Based on experts’ judgment, a frame of work was proposed. The proposed model applies ANFIS and Mamdani inference fuzzy system to get the desired results and then results of two methods were compared. Two questionnaires were used in this study. The first questionnaire was developed for e-commerce experts, and the second one was designed for the customers of electronic websites. Based on AHP method, Expert Choice software was used to determine the priority of factors in the first questionnaire, and MATLAB and Excel were used for developing the fuzzy rules. Finally, the fuzzy logical kit was used to analyze the generated factors in the model. Our study findings show that trust in EC transactions is strongly mediated by perceived security. 展开更多
关键词 TRUST securITY ANFIS Fuzzy Logic Rule Based Systems electronic COMMERCE
下载PDF
Design of the XML Security System for Electronic Commerce Application 被引量:1
9
作者 安南 Zhang Shensheng 《High Technology Letters》 EI CAS 2003年第2期81-86,共6页
The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructu... The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructure would need to be put into place transforming the wild-and-woolly Internet into a network with end-to-end protections. XML (extensible Markup Language) is widely accepted as powerful data representation standard for electronic documents, so a security mechanism for XML documents must be provided in the first place to secure electronic commerce over Internet. In this paper the authors design and implement a secure framework that provides XML signature function, XML Element-wise Encryption function, smart card based crypto API library and Public Key Infrastructure (PKI) security functions to achieve confidentiality, integrity, message authentication, and/or signer authentication services for XML documents and existing non-XML documents that are exchanged by Internet for E-commerce application. 展开更多
关键词 electronic commerce security digital certificates smart card digital commerce AUTHENTICATION transaction integrity verification internet XML
下载PDF
The Digital Currency of China’s Central Bank:Digital Currency Electronic Payment(DCEP) 被引量:1
10
作者 Chen Gengxuan Jia Qinmin +1 位作者 Ling Hao Liu Yuyang 《Contemporary Social Sciences》 2021年第4期1-19,共19页
DCEP is the Chinese version of Central Bank Digital Currency(CBDC).It is the only legal digital currency in China and meets four conditions:(a)it is issued by the central bank;(b)it is digitized;(c)it is account and w... DCEP is the Chinese version of Central Bank Digital Currency(CBDC).It is the only legal digital currency in China and meets four conditions:(a)it is issued by the central bank;(b)it is digitized;(c)it is account and wallet based;(d)it is oriented towards the general public.As a retail central bank digital currency,it has three main technical features:a“tiered limit arrangement”(small-scale payments can be made anonymously while large-scale payments cannot),a“two-tier operating system”(as with the central bank-commercial bank traditional model),and a“dual offline payment system”(supporting both parties of the transaction).Compared with CBDCs in other countries,China’s DCEP has smaller economic impacts,more obscure strategic goals,and more scarce technical details.But its progress in testing is ahead of central banks of other countries.This article is based on public information and is intended to explain what DCEP is and why and how it was developed.It also offers suggestions for future research. 展开更多
关键词 Central Bank Digital Currency(CBDC) Digital Currency electronic payment(DCEP) technology characteristics research prospects
下载PDF
Electronic Payment Scheme to Prevent the Treachery
11
作者 FAN Kai ZHANG Jun KOU Weidong XIAO Guozhen 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1745-1748,共4页
Treachery is one of the restrictions to the development of electronic commerce. To prevent the treachery from the participants in electronic commerce, in this paper a secure electronic payment scheme is proposed and i... Treachery is one of the restrictions to the development of electronic commerce. To prevent the treachery from the participants in electronic commerce, in this paper a secure electronic payment scheme is proposed and its security is analyzed. This scheme can prevent the treachery only with the aid of an un-trusted third party. It is very simple and it also improves the security and provides the non-repudiation, accountability, fairness and privacy. 展开更多
关键词 treachery electronic payment scheme electronic commerce security
下载PDF
ACSEPP On-Line Electronic Payment Protocol
12
作者 WANGShao-bin ZHUXian HONGFan 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期717-721,共5页
With analyzing the existing on-line electronic payment protocols, this paper presents a new on-line electronic payment protocol named ACSEPP: Anonymous, Convenient and Secure Electronic Payment Protocol. Its aim is to... With analyzing the existing on-line electronic payment protocols, this paper presents a new on-line electronic payment protocol named ACSEPP: Anonymous, Convenient and Secure Electronic Payment Protocol. Its aim is to design a practical electronic payment protocol which is both secure and conveinent. Without using PKI_CA frame, it realized the anonymity of consumer and merchant, the convenient of handling, the low cost of maintenance and the security. Key words electronic commeree - electronic payment - convenient - anonymity CLC number TP 393 Foundation item: Supported by the National High Technology Development 863 Program of China (863-301-1-3) and Huazhong University of Science and Technology of Ph. D. Fund Project.Biography: WANG Shao-bin, male, Ph. D, research direction: information security and electronic commerce. 展开更多
关键词 electronic commeree electronic payment CONVENIENT ANONYMITY
下载PDF
The Design and Construction of an Intelligent Taxi Electronic Payment System Solution
13
作者 Mozhgan Sadeghian Soheila Dadjou +2 位作者 Majid Meghdadi Leila Safari Somayyeh Sadeghian 《Intelligent Control and Automation》 2011年第4期413-417,共5页
Today the usage of electronic services in different taxies seems to be necessary. Organizing a system to pay the taxi electronically with the card by the passenger can decrease the need to carry cash. Designing and bu... Today the usage of electronic services in different taxies seems to be necessary. Organizing a system to pay the taxi electronically with the card by the passenger can decrease the need to carry cash. Designing and building of such a system by using a special taximeter with new features and also one or more card reader can be fixed into the taxi. Payment is with the smart credit card and from the client's account. The information of presented services is stored in the system and will be recorded as offered services. The driver can have access to taxi organization or some special terminals electronically to see his account and also he can receive a receipt. 展开更多
关键词 electronic SMART CARD AUTOMATION of payment INTELLIGENT System
下载PDF
Comparative Research on Payment Protocols SSL and SET in Electronic Commerce
14
作者 Hanyang Luo Xudong Lin 《Chinese Business Review》 2004年第3期17-21,共5页
The security of electronic payment is one discusses the secure mechanism and transaction process of the key problems in electronic commerce. This paper of the two electronic payment protocols SSL and SET, and presents... The security of electronic payment is one discusses the secure mechanism and transaction process of the key problems in electronic commerce. This paper of the two electronic payment protocols SSL and SET, and presents the differences between them on security, function and practicality. SSL takes an active role in current electronic payment. With high security and perfect specifications, however, SET isn't widely used at present because of its complexity. But it will change in the future. 展开更多
关键词 SSL SET security electronic commerce electronic payment
下载PDF
Efficient protocol of secure mobile payment
15
作者 LI Xi HU Han-ping 《通讯和计算机(中英文版)》 2007年第5期22-27,共6页
关键词 支付协议 电子商务 支付安全 行动付款
下载PDF
A Micro-Payment Based Isolation ofMisbehavior Secure Routing for Sensor Network
16
作者 LIHui WEIWei CHENKe-fei 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期93-97,共5页
In this paper, we present a Micro-payment based Isolation of Misbehavior(MIM) secure routing protocol. The protocol contains three parts: micro-payment scheme, routingdiscovery and malicious nodes detection The micro-... In this paper, we present a Micro-payment based Isolation of Misbehavior(MIM) secure routing protocol. The protocol contains three parts: micro-payment scheme, routingdiscovery and malicious nodes detection The micro-payment scheme proposed in MIM is the firstvirtual currency system that can be suit lor sensor network environment, Based on the micro-paymentscheme, we device an energy aware routing protocol, which forwards packets by auction. Furthermore,the base station can detect and isolate misbehave or non-cooptrare nodes according to the routinginformation. 展开更多
关键词 secure routing wireless sensor network MICRO-payment
下载PDF
A Trusted Smart Phone and Its Applications in Electronic Payment
17
作者 Chang-Ying Zhou Chun-Ru Zhang 《Journal of Electronic Science and Technology of China》 2007年第3期206-211,共6页
With the growing intelligence and popularity of mobile phones, and the trend of cellular network's convergence to IP based network, more and more mobile applications emerge on the market. For mission critical applica... With the growing intelligence and popularity of mobile phones, and the trend of cellular network's convergence to IP based network, more and more mobile applications emerge on the market. For mission critical applications, like the electronic payment which will be discussed in this paper, the lack of trust in the underlying mobile infrastructure and secure interface to legacy systems (for this case, the banking systems) poses obstacles to their widespread presence in mobile services. Recently, the exposure of hacking of iPhone and other smart phones further emphasizes the criticality of establishing a trust platform for mobile applications. This paper analyzes the building blocks of the trusted smart phone, and proposes a framework to provide a trusted platform for mobile electronic payment. Such a proposed system may allow direct interface to the banking systems due to the banking industry recognized strong security, and hence, may enable its widespread use. 展开更多
关键词 Mobile electronic payment trusted computing trusted platform module.
下载PDF
Modeling Electronic Payment Systems Based on Dynamic Game
18
作者 Ling Zhang Jianping Yin Mengjun Li 《通讯和计算机(中英文版)》 2006年第8期69-75,共7页
下载PDF
基于改进的3-D Secure协议的移动支付安全解决方案 被引量:5
19
作者 卫红春 马丁 《计算机应用与软件》 CSCD 2011年第4期189-192,共4页
借鉴国外已有的移动交易支付模式,结合我国金融系统的特点及安全要求,提出了一种基于改进的3-D Secure协议的移动支付安全方案,该方案采用AES(Advanced Encryption Standard)算法对通信报文加密,通过一套支持多信道报文安全传输控制的... 借鉴国外已有的移动交易支付模式,结合我国金融系统的特点及安全要求,提出了一种基于改进的3-D Secure协议的移动支付安全方案,该方案采用AES(Advanced Encryption Standard)算法对通信报文加密,通过一套支持多信道报文安全传输控制的安全认证体系,来保证在移动支付业务中的客户、商户和资金信息的安全。分析并测试验证了该方案在支付业务中的可行性和安全性。 展开更多
关键词 移动支付 安全方案 3-D secure AES
下载PDF
基于3-D Secure的手机支付系统的实现 被引量:1
20
作者 李曦 赵高权 《西华大学学报(自然科学版)》 CAS 2011年第4期83-85,93,共4页
针对移动支付业务的特点和需求,基于3-D安全支付协议,构建一个安全的手机支付系统。从商家服务器、发卡行服务器、手机终端三方分别讨论了支付系统的具体实现,并通过加解密、数字签名等密码技术保证了支付的安全性。
关键词 电子商务 手机支付 支付安全 3-Dsecure协议
下载PDF
上一页 1 2 122 下一页 到第
使用帮助 返回顶部