Academic literature on the topic 'Secure e-commerce'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure e-commerce.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Secure e-commerce"

1

Cebeci, Sena Efsun, Kubra Nari, and Enver Ozdemir. "Secure E-Commerce Scheme." IEEE Access 10 (2022): 10359–70. http://dx.doi.org/10.1109/access.2022.3145030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Masadeh, Shadi R., Shadi Aljawarneh, Ashraf Odeh, and Abdullah Alhaj. "Secure Communication." International Journal of Information Security and Privacy 7, no. 4 (2013): 1–10. http://dx.doi.org/10.4018/ijisp.2013100101.

Full text
Abstract:
The idea of e-Commerce is to take advantage of all the possibilities offered by information technology (such as digital communications, multimedia, internet, cell phones, teleconferences, etc.) and to improve the security of various organizations. In the article, the authors focus on securing all the contents of e-Commerce by proposing a public key watermarking algorithm for web content integrity verification. The main purpose of this article is to present a new security system that enables e-Commerce to exchange data more securely and by altering the file content structure, detecting illegal
APA, Harvard, Vancouver, ISO, and other styles
3

S, Bala Musa, Norita Md Norwawi, and Mohd Hasan Selamat. "Secure E-commerce Web Development Framework." Information Technology Journal 10, no. 4 (2011): 769–78. http://dx.doi.org/10.3923/itj.2011.769.778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dr. B. Veera Jyothi et al.,, Dr B. Veera Jyothi et al ,. "Smart E-Commerce Application with Secure Blockchain." International Journal of Mechanical and Production Engineering Research and Development 10, no. 3 (2020): 7209–20. http://dx.doi.org/10.24247/ijmperdjun2020682.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Aljifri, H., and A. P. Pons. "Reducing Overhead of Secure E-Commerce Transactions." International Journal of Computers and Applications 26, no. 4 (2004): 1–6. http://dx.doi.org/10.1080/1206212x.2004.11441746.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Abbott, Shawn. "The Debate for Secure E[lectronic]Commerce." EDPACS 27, no. 1 (1999): 17–19. http://dx.doi.org/10.1201/1079/43247.27.1.19990701/30254.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Guan, Sheng-Uei, and Yang Yang. "SAFE: secure agent roaming for e-commerce." Computers & Industrial Engineering 42, no. 2-4 (2002): 481–93. http://dx.doi.org/10.1016/s0360-8352(02)00042-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhou, Gui Xian, and Ding Yi Zhang. "Trusted Operating Systems for Manufacturing E-Commerce System Secure." Advanced Materials Research 811 (September 2013): 608–12. http://dx.doi.org/10.4028/www.scientific.net/amr.811.608.

Full text
Abstract:
manufacturing e-commerce systems are considered as the backbone of the manufacturing industry in China, Vulnerabilities in web applications continue to be the most frequently discovered security problem. This article illustrates a trusted operating systems how to provide a flexible solution to the problem of application for e-commerce. With the help of Chinese Wall, web services are becoming popular in Web applications. In the end, we present strategies for e-commerce application: trusted e-commerce module.
APA, Harvard, Vancouver, ISO, and other styles
9

Farah, Tawfiq Abdul Hussien, Monem S. Rahma Abdul, and Bahjat Abdul Wahab Hala. "Design and implement a new secure prototype structure of e-commerce system." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 1 (2022): 560–71. https://doi.org/10.11591/ijece.v12i1.pp560-571.

Full text
Abstract:
The huge development of internet technologies and the widespread of modern and advanced devices lead to an increase in the size and diversity of e-commerce system development. These developments lead to an increase in the number of people that navigate these sites asking for their services and products. Which leads to increased competition in this field. Moreover, the expansion in the size of currency traded makes transaction protection an essential issue in this field. Providing security for each online client especially for a huge number of clients at the same time, causing an overload on th
APA, Harvard, Vancouver, ISO, and other styles
10

Andeh, Chioma P. R. "Designing A New Framework for Securing Electronic Commerce Systems at Design Phase: With A Special Reference to an Emerging Economy." International Journal of Advances in Scientific Research and Engineering (ijasre) 5, no. 9 (2019): 92–106. https://doi.org/10.31695/IJASRE.2019.33501.

Full text
Abstract:
 In an emerging economy like Nigeria, internet-based businesses are growing at an exponential rate but this growth is highly threatened by many instances of fraud and e-systems’ compromise. While a lot of research work has been done on how to secure e-commerce transaction protocols, improve cryptographic schemes and amend the technical and business issues in e-commerce, the area of mitigating security challenges by incorporating security modules at design time has not been thoroughly explored. Hence, in this paper we present a framework for e-commerce security with a focus on four s
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Secure e-commerce"

1

Subramanian, Srividhya. "Design and verification of secure E-commerce protocols /." The Ohio State University, 2000. http://rave.ohiolink.edu/etdc/view?acc_num=osu1488192119264905.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Blanco, Justicia Alberto. "Cryptographic protocols for privacy-aware and secure e-commerce." Doctoral thesis, Universitat Rovira i Virgili, 2017. http://hdl.handle.net/10803/402465.

Full text
Abstract:
Aquesta tesi tracta sobre la investigació i el desenvolupament de tecnologies de millora de la privadesa per a proporcionar als consumidors de serveis de comerç electrònic el control sobre quanta informació privada volen compartir amb els proveïdors de serveis. Fem servir tecnologies existents, així com tecnologies desenvolupades durant aquesta tesi, per a protegir als usuaris de la recoleció excessiva de dades per part dels proveïdors de serveis en aplicacions específiques. En particular, fem servir un nou esquema de signatura digital amb llindar dinàmic i basat en la identitat per a implemen
APA, Harvard, Vancouver, ISO, and other styles
3

Smith, Leslie Gordon. "The role of the notary in secure electronic commerce." Thesis, Queensland University of Technology, 2006. https://eprints.qut.edu.au/16407/1/Leslie_Smith_Thesis.pdf.

Full text
Abstract:
The profession of the notary is at a cross roads. The Notary operates in a world of paperbased transactions where the use of traditional signatures and seals are mandatory. The practices and procedures which have evolved over centuries simply cannot be applied directly in a digital environment. Establishing a framework for the authentication of computer-based information in today's commercial environment requires a familiarity with concepts and professional skills from both the legal and computer security fields. Combining these two disciplines is not an easy task. Concepts from the informa
APA, Harvard, Vancouver, ISO, and other styles
4

Smith, Leslie Gordon. "The role of the notary in secure electronic commerce." Queensland University of Technology, 2006. http://eprints.qut.edu.au/16407/.

Full text
Abstract:
The profession of the notary is at a cross roads. The Notary operates in a world of paperbased transactions where the use of traditional signatures and seals are mandatory. The practices and procedures which have evolved over centuries simply cannot be applied directly in a digital environment. Establishing a framework for the authentication of computer-based information in today's commercial environment requires a familiarity with concepts and professional skills from both the legal and computer security fields. Combining these two disciplines is not an easy task. Concepts from the informa
APA, Harvard, Vancouver, ISO, and other styles
5

Kounelis, Ioannis. "Secure and Trusted Mobile Commerce System based on Virtual Currencies." Doctoral thesis, KTH, Kommunikationssystem, CoS, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166701.

Full text
Abstract:
With the widespread usage of mobile devices and their applications, many areas of innovation have created a multitude of opportunities for mobile technologies to be deployed with very interesting effects. One such new area that emerged in the last few years is mobile commerce. It represents a system where various entities create real–life or digital assets, distribute information about them to interested consumers, execute transactions, accept various types of compensation methods, and finally deliver these assets; all of it in a secure and trusted manner, respecting users’ privacy. Since mobi
APA, Harvard, Vancouver, ISO, and other styles
6

Du, Rong. "Secure electronic tendering." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16606/1/Rong_Du_Thesis.pdf.

Full text
Abstract:
Tendering is a method for entering into a sales contract. Numerous electronic tendering systems have been established with the intent of improving the efficiency of the tendering process. Although providing adequate security services is a desired feature in an e-tendering system, current e-tendering systems are usually designed with little consideration of security and legal compliance. This research focuses on designing secure protocols for e-tendering systems. It involves developing methodologies for establishing security requirements, constructing security protocols and using formal
APA, Harvard, Vancouver, ISO, and other styles
7

Du, Rong. "Secure electronic tendering." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16606/.

Full text
Abstract:
Tendering is a method for entering into a sales contract. Numerous electronic tendering systems have been established with the intent of improving the efficiency of the tendering process. Although providing adequate security services is a desired feature in an e-tendering system, current e-tendering systems are usually designed with little consideration of security and legal compliance. This research focuses on designing secure protocols for e-tendering systems. It involves developing methodologies for establishing security requirements, constructing security protocols and using formal
APA, Harvard, Vancouver, ISO, and other styles
8

Söderbergh, Veronica, and Zainab Mahdizadeh. "Handel på Facebook och Instagram : Och faktorer som kan påverka benägenheten till det." Thesis, Högskolan i Borås, Akademin för textil, teknik och ekonomi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-26599.

Full text
Abstract:
Internet är ett ständigt växande fenomen med nya innovationer. Som en följd av utvecklandet av Internet har e-handel uppkommit och då även handel via de sociala mediesidorna Facebook och Instagram. Genom att en stor del av internetanvändare befinner sig på de båda plattformarna kan företag dra nytta av att befinna sig där samt att möjliggöra för konsumenter att kunna handla från dem där för att nå fler människor. Konsumenter kan handel på plattformarna bidra till en ökad smidighet då en produkt kan köpas direkt när den ses i Instagram flödet. Syftet med studien är studera handel på Facebook re
APA, Harvard, Vancouver, ISO, and other styles
9

Cheong, Chi Po. "Efficient and secure card-based payment system based on ANSI X9.59-2006." Thesis, University of Macau, 2007. http://umaclib3.umac.mo/record=b1684528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

SANCHEZ, CASAS YOSELIN MONSERRAT. "PROPUESTA PARA QUE LAS EMPRESAS DEDICADAS A E-COMMERCE USEN EL PROTOCOLO SECURE ELECTRONIC TRANSACTION “SET” PARA BRINDAR SEGURIDAD EN LAS TRANSACCIONES." Tesis de Licenciatura, Universidad Autónoma del Estado de México, 2014. http://hdl.handle.net/20.500.11799/65910.

Full text
Abstract:
La seguridad es un elemento primordial en los sistemas informáticos actuales. Preservar la información y la integridad de un sistema informático es muy importante para una empresa u organización, por lo que en pérdidas económicas y de tiempo podría suponer. Y por tal motivo, es de gran importancia implementar protocolos de seguridad informática en empresas dedicadas a e-commerce para brindar Seguridad en las Transacciones, como en el presente trabajo de investigación, que se propone implementar el Protocolo Secure Electronic Transaction “SET”, que significa Transacción Electrónica Segura. Sie
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Secure e-commerce"

1

Bîrjoveanu, Cătălin V., and Mirela Bîrjoveanu. Secure Multi-Party E-Commerce Protocols. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Matsumoto, Tsuneo. Establishment of a secure and safe e-commerce marketplace. Economic Research Institute for ASEAN and East Asia, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jonathan, Reuvid, ed. The Secure online business handbook: E-Commerce, IT functionality, & business continuity. 2nd ed. Kogan Page, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Reuvid, Jonathan. The secure online business: E-commerce, IT functionality and business continuity. Kogan Page, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Faber, Eberhard. Secure ICT Service Provisioning for Cloud, Mobile and Beyond: A Workable Architectural Approach Balancing Between Buyers and Providers. Springer Fachmedien Wiesbaden, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ueki, Yashushi. E-business innovation and customs renovation for secure supply chain management. United Nations, Economic Commission for Latin America and the Caribbean, Division of International Trade and Integration, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Secure IT for E-Commerce. Canadian Institute of Chartered Accountants, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cătălin V. Bîrjoveanu and Mirela Bîrjoveanu. Secure Multi-Party e-Commerce Protocols. Springer International Publishing AG, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kumar, Venkataiahgari Anil. Secure E-Commerce Transactions for Multicast Services. Simon & Schuster, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

The Secure Online Business: E-Commerce, It Functionality & Business Continuity. Kogan Page, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Secure e-commerce"

1

Romão, Artur, and Miguel Mira da Silva. "Secure Mobile Agent Digital Signatures with Proxy Certificates." In E-Commerce Agents. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45370-9_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bîrjoveanu, Cătălin V., and Mirela Bîrjoveanu. "Two-Party E-Commerce Protocols." In Secure Multi-Party E-Commerce Protocols. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wong, Johnny W., Lev Mirlas, Weidong Kou, and Xiaodong Lin. "Credit Card-Based Secure Online Payment." In Payment Technologies for E-Commerce. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-662-05322-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Manchala, Daniel W. "Fuzzy Quantifiable Trust in Secure E-Commerce." In E-Commerce and Intelligent Methods. Physica-Verlag HD, 2002. http://dx.doi.org/10.1007/978-3-7908-1779-9_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Al-Meaither, Mansour A., and Chris J. Mitchell. "A Secure Electronic Payment Scheme for Charity Donations." In E-Commerce and Web Technologies. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45229-4_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Agnew, Gordon. "Secure Electronic Transactions: Overview, Capabilities, and Current Status." In Payment Technologies for E-Commerce. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-662-05322-5_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bîrjoveanu, Cătălin V., and Mirela Bîrjoveanu. "Conclusions." In Secure Multi-Party E-Commerce Protocols. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bîrjoveanu, Cătălin V., and Mirela Bîrjoveanu. "Multi-party E-Commerce Protocols for Complex Transactions." In Secure Multi-Party E-Commerce Protocols. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bîrjoveanu, Cătălin V., and Mirela Bîrjoveanu. "Formal Verification of Multi-party Fair Exchange E-Commerce Protocols." In Secure Multi-Party E-Commerce Protocols. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bîrjoveanu, Cătălin V., and Mirela Bîrjoveanu. "Introduction." In Secure Multi-Party E-Commerce Protocols. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Secure e-commerce"

1

S, Sakthimurugan, K. Ragini, K. Priyadharsini, Varanasi Srinivas, Zaid Ajzan Alsalami, and Prashant Gupta. "Blockchain-Based Secure Payment Systems for E-Commerce." In 2025 International Conference on Intelligent Control, Computing and Communications (IC3). IEEE, 2025. https://doi.org/10.1109/ic363308.2025.10956192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Thomas, Sneha Ann, and A. Sivakumar. "A Framework for Secure Identity Management in E-Commerce Shopping and Transactions." In 2025 3rd International Conference on Inventive Computing and Informatics (ICICI). IEEE, 2025. https://doi.org/10.1109/icici65870.2025.11069948.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Srinivas, Madhira, Mrudula Kilaru, Divya Jain, and Kawerinder Singh Sidhu. "Fraud Detection and Prevention in E-Commerce: Machine Learning Approaches to Secure Transactions." In 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT). IEEE, 2025. https://doi.org/10.1109/ce2ct64011.2025.10939681.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shimamura, Makoto, Shingo Matsugaya, Keisuke Sakai, Kosuke Takeshige, and Masaki Hashimoto. "An Analysis of the Relationship Between Black-Hat SEO Malware Families Leveraging Information from Redirected Fake E-Commerce Scam Sites." In 2024 IEEE Conference on Dependable and Secure Computing (DSC). IEEE, 2024. http://dx.doi.org/10.1109/dsc63325.2024.00025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Imtiaz, Shaik Mohammed, Thammisetti Charan, Rampogu Sumanth, Tirividi Praveen, Talari Sekhar, and Bathula Sowjanya. "IoT-Enabled E-Commerce Platform Integrating Blockchain and AI for Secure, Transparent, and Sustainable Organic Trade." In 2025 5th International Conference on Pervasive Computing and Social Networking (ICPCSN). IEEE, 2025. https://doi.org/10.1109/icpcsn65854.2025.11035746.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pathak, Deependra Nath, Ankit Kumar, Kriti Srivastava, Radha Ranjan, Kirandeep Kaur, and Ramanjeet Singh. "Improving E-Commerce Fraud Detection: A GAN and Reinforcement Learning Approach Integrated with Personality Analysis for Secure Digital Economy." In 2025 International Conference on Visual Analytics and Data Visualization (ICVADV). IEEE, 2025. https://doi.org/10.1109/icvadv63329.2025.10961112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gupta, Ashish, Harsh Yadav, and Shanu Sharma. "Revolutionizing E-Commerce Security: A Secured Infrastructure Utilizing BlockChain." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725993.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chennupati, Anandkumar, and M. Vivek Kumar. "AI-driven Risk Assessment Algorithm for Secured transactions in E-Commerce applications." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724881.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Yuewen. "Research on E-Commerce Secure Technology." In 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2010. http://dx.doi.org/10.1109/wicom.2010.5601308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Boughaci, Dalila, and Habiba Drias. "A secure e-transaction model for e-commerce." In 2006 IEEE GCC Conference. IEEE, 2006. http://dx.doi.org/10.1109/ieeegcc.2006.5686242.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Secure e-commerce"

1

Islam, Fariha, and Wahid bin Ahsan. Strengthening Consumer Trust in Bangladesh’s E-Commerce: Factors and Strategies. Userhub, 2024. http://dx.doi.org/10.58947/journal.kpry56.

Full text
Abstract:
This study examines the key factors shaping consumer trust in Bangladesh’s e-commerce sector using a mixed-methods approach, incorporating qualitative interviews with 14 key stakeholders and quantitative survey data from 100 online shoppers. The findings identify crucial drivers of trust, including product authenticity, payment security, post-purchase support, and logistical reliability. Trust is eroded by issues such as fake reviews, misleading product descriptions, and poor customer service, while secure payment options and transparent return policies are essential for rebuilding consumer co
APA, Harvard, Vancouver, ISO, and other styles
2

Rashid, Kazi Harunur, and Wahid bin Ahsan. User Trust in E-Commerce through Product List Pages, Detail Pages, Reviews, and Security Features. Userhub, 2024. http://dx.doi.org/10.58947/journal.dmvq89.

Full text
Abstract:
This study investigates how design elements on Product List Pages (PLPs) and Product Detail Pages (PDPs) impact user trust in e-commerce. Using a mixed-methods approach with 65 survey respondents and 22 interview participants, the research reveals that consistency in UI design, high-quality product images, detailed descriptions, verified customer reviews, and visible security features are critical in fostering user trust. Well-structured navigation, accurate product information, and robust security measures significantly enhance trust and influence purchasing decisions, while misleading produc
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!