We present a multi-signature scheme based on DSA and describes a faireleetronic payment scheme based on improved DSA signatures. The scheme, makes both sides in e-qualpositions during the course of electronic transact...We present a multi-signature scheme based on DSA and describes a faireleetronic payment scheme based on improved DSA signatures. The scheme, makes both sides in e-qualpositions during the course of electronic transaction A Trusted Third Party (TTP)is involved in thescheme to guarantee the fairness of the scheme for both sides. However, only during the course ofregistration and dispute resolution will TTP be needed TTP is not needed during the normal paymentstage.展开更多
The security of electronic payment is one discusses the secure mechanism and transaction process of the key problems in electronic commerce. This paper of the two electronic payment protocols SSL and SET, and presents...The security of electronic payment is one discusses the secure mechanism and transaction process of the key problems in electronic commerce. This paper of the two electronic payment protocols SSL and SET, and presents the differences between them on security, function and practicality. SSL takes an active role in current electronic payment. With high security and perfect specifications, however, SET isn't widely used at present because of its complexity. But it will change in the future.展开更多
In the last two decades,Internet technologies,such as cloud computing,mobile communications,social media,and big data analytics,have brought tremendous changes to our society and reshaped the business in various indus...In the last two decades,Internet technologies,such as cloud computing,mobile communications,social media,and big data analytics,have brought tremendous changes to our society and reshaped the business in various industries.Specifically,the mushrooming innovations in the financial area fertilized by information and communication technologies indicates the advent of the Internet finance era.Applying the exploratory research approach,we investigate major innovative Internet-based financial services and classify them into five categories,as of e-commerce,e-payment,e-money market,online loan services,and digital currencies.Then we propose a market structure of Internet finance extended from the traditional financial market.We claim that credit management is the key issue in the marketplace of Internet finance,characterized by big data analytics,in which cyber credit appears as whole-process,multi-dimensional,and holographic.We further suggest that cyber credit be represented in the form of vector to overcome the limits of traditional single-value measure in cyber credit management.Based on this framework,we raise main research issues in Internet finance from the perspectives of theory,technology,and governance.展开更多
The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructu...The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructure would need to be put into place transforming the wild-and-woolly Internet into a network with end-to-end protections. XML (extensible Markup Language) is widely accepted as powerful data representation standard for electronic documents, so a security mechanism for XML documents must be provided in the first place to secure electronic commerce over Internet. In this paper the authors design and implement a secure framework that provides XML signature function, XML Element-wise Encryption function, smart card based crypto API library and Public Key Infrastructure (PKI) security functions to achieve confidentiality, integrity, message authentication, and/or signer authentication services for XML documents and existing non-XML documents that are exchanged by Internet for E-commerce application.展开更多
This paper focuses on the level of adoption of E-Commerce Technology at the Scientific and Industrial Research and Development Centre (SIRDC), a Zimbabwean organization established by an act of parliament, with a mand...This paper focuses on the level of adoption of E-Commerce Technology at the Scientific and Industrial Research and Development Centre (SIRDC), a Zimbabwean organization established by an act of parliament, with a mandate to develop, adopt and adapt new technologies for the benefit of Zimbabwean companies and organizations. The study was done in 2004 and the findings reviewed in 2012 with similar results. The objective of the study was to establish whether E-commerce technology adoption would result in the organization being more efficient and effective in delivering its mandate and then establish the level of adoption of the technology at the centre using abstraction and a questionnaire survey. Abstraction results showed that organizations which had fully embraced the technology were more efficient and effective while the survey revealed that the centre had partially adopted the technology. It was recommended that the centre should fully embrace the technology and market it to other organizations as per its mandate.展开更多
Treachery is one of the restrictions to the development of electronic commerce. To prevent the treachery from the participants in electronic commerce, in this paper a secure electronic payment scheme is proposed and i...Treachery is one of the restrictions to the development of electronic commerce. To prevent the treachery from the participants in electronic commerce, in this paper a secure electronic payment scheme is proposed and its security is analyzed. This scheme can prevent the treachery only with the aid of an un-trusted third party. It is very simple and it also improves the security and provides the non-repudiation, accountability, fairness and privacy.展开更多
In this paper, an efficient fair e-cash system is presented. Based on the improved Brands’ e-cash scheme, it is expanded by adding two roles, government and judges. The user can keep unconditionally anonymous in norm...In this paper, an efficient fair e-cash system is presented. Based on the improved Brands’ e-cash scheme, it is expanded by adding two roles, government and judges. The user can keep unconditionally anonymous in normal transactions. Authorized by the judges, the government can remove the identity of an illegal user with the help of the bank. So such misuse as blackmailing or money laundering can be prevented. Therefore, this scheme is more efficient, more suitable for adopting pre-processing and post-processing and more practical. In the paper, the details of the scheme are described, its security is proved, and its efficiency is analyzed.展开更多
文摘We present a multi-signature scheme based on DSA and describes a faireleetronic payment scheme based on improved DSA signatures. The scheme, makes both sides in e-qualpositions during the course of electronic transaction A Trusted Third Party (TTP)is involved in thescheme to guarantee the fairness of the scheme for both sides. However, only during the course ofregistration and dispute resolution will TTP be needed TTP is not needed during the normal paymentstage.
文摘The security of electronic payment is one discusses the secure mechanism and transaction process of the key problems in electronic commerce. This paper of the two electronic payment protocols SSL and SET, and presents the differences between them on security, function and practicality. SSL takes an active role in current electronic payment. With high security and perfect specifications, however, SET isn't widely used at present because of its complexity. But it will change in the future.
文摘In the last two decades,Internet technologies,such as cloud computing,mobile communications,social media,and big data analytics,have brought tremendous changes to our society and reshaped the business in various industries.Specifically,the mushrooming innovations in the financial area fertilized by information and communication technologies indicates the advent of the Internet finance era.Applying the exploratory research approach,we investigate major innovative Internet-based financial services and classify them into five categories,as of e-commerce,e-payment,e-money market,online loan services,and digital currencies.Then we propose a market structure of Internet finance extended from the traditional financial market.We claim that credit management is the key issue in the marketplace of Internet finance,characterized by big data analytics,in which cyber credit appears as whole-process,multi-dimensional,and holographic.We further suggest that cyber credit be represented in the form of vector to overcome the limits of traditional single-value measure in cyber credit management.Based on this framework,we raise main research issues in Internet finance from the perspectives of theory,technology,and governance.
文摘The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructure would need to be put into place transforming the wild-and-woolly Internet into a network with end-to-end protections. XML (extensible Markup Language) is widely accepted as powerful data representation standard for electronic documents, so a security mechanism for XML documents must be provided in the first place to secure electronic commerce over Internet. In this paper the authors design and implement a secure framework that provides XML signature function, XML Element-wise Encryption function, smart card based crypto API library and Public Key Infrastructure (PKI) security functions to achieve confidentiality, integrity, message authentication, and/or signer authentication services for XML documents and existing non-XML documents that are exchanged by Internet for E-commerce application.
文摘This paper focuses on the level of adoption of E-Commerce Technology at the Scientific and Industrial Research and Development Centre (SIRDC), a Zimbabwean organization established by an act of parliament, with a mandate to develop, adopt and adapt new technologies for the benefit of Zimbabwean companies and organizations. The study was done in 2004 and the findings reviewed in 2012 with similar results. The objective of the study was to establish whether E-commerce technology adoption would result in the organization being more efficient and effective in delivering its mandate and then establish the level of adoption of the technology at the centre using abstraction and a questionnaire survey. Abstraction results showed that organizations which had fully embraced the technology were more efficient and effective while the survey revealed that the centre had partially adopted the technology. It was recommended that the centre should fully embrace the technology and market it to other organizations as per its mandate.
基金Supported by the National Natural Science Foun-dation of China (90304008) Specialized Research Fund for the Doc-toral Programof Higher Education of China(20040701001) theGraduate Innovation Fund of Xidian University(05017 ,05019)
文摘Treachery is one of the restrictions to the development of electronic commerce. To prevent the treachery from the participants in electronic commerce, in this paper a secure electronic payment scheme is proposed and its security is analyzed. This scheme can prevent the treachery only with the aid of an un-trusted third party. It is very simple and it also improves the security and provides the non-repudiation, accountability, fairness and privacy.
文摘In this paper, an efficient fair e-cash system is presented. Based on the improved Brands’ e-cash scheme, it is expanded by adding two roles, government and judges. The user can keep unconditionally anonymous in normal transactions. Authorized by the judges, the government can remove the identity of an illegal user with the help of the bank. So such misuse as blackmailing or money laundering can be prevented. Therefore, this scheme is more efficient, more suitable for adopting pre-processing and post-processing and more practical. In the paper, the details of the scheme are described, its security is proved, and its efficiency is analyzed.