To see the other types of publications on this topic, follow the link: Secure e-commerce.

Dissertations / Theses on the topic 'Secure e-commerce'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 26 dissertations / theses for your research on the topic 'Secure e-commerce.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Subramanian, Srividhya. "Design and verification of secure E-commerce protocols /." The Ohio State University, 2000. http://rave.ohiolink.edu/etdc/view?acc_num=osu1488192119264905.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Blanco, Justicia Alberto. "Cryptographic protocols for privacy-aware and secure e-commerce." Doctoral thesis, Universitat Rovira i Virgili, 2017. http://hdl.handle.net/10803/402465.

Full text
Abstract:
Aquesta tesi tracta sobre la investigació i el desenvolupament de tecnologies de millora de la privadesa per a proporcionar als consumidors de serveis de comerç electrònic el control sobre quanta informació privada volen compartir amb els proveïdors de serveis. Fem servir tecnologies existents, així com tecnologies desenvolupades durant aquesta tesi, per a protegir als usuaris de la recoleció excessiva de dades per part dels proveïdors de serveis en aplicacions específiques. En particular, fem servir un nou esquema de signatura digital amb llindar dinàmic i basat en la identitat per a implemen
APA, Harvard, Vancouver, ISO, and other styles
3

Smith, Leslie Gordon. "The role of the notary in secure electronic commerce." Thesis, Queensland University of Technology, 2006. https://eprints.qut.edu.au/16407/1/Leslie_Smith_Thesis.pdf.

Full text
Abstract:
The profession of the notary is at a cross roads. The Notary operates in a world of paperbased transactions where the use of traditional signatures and seals are mandatory. The practices and procedures which have evolved over centuries simply cannot be applied directly in a digital environment. Establishing a framework for the authentication of computer-based information in today's commercial environment requires a familiarity with concepts and professional skills from both the legal and computer security fields. Combining these two disciplines is not an easy task. Concepts from the informa
APA, Harvard, Vancouver, ISO, and other styles
4

Smith, Leslie Gordon. "The role of the notary in secure electronic commerce." Queensland University of Technology, 2006. http://eprints.qut.edu.au/16407/.

Full text
Abstract:
The profession of the notary is at a cross roads. The Notary operates in a world of paperbased transactions where the use of traditional signatures and seals are mandatory. The practices and procedures which have evolved over centuries simply cannot be applied directly in a digital environment. Establishing a framework for the authentication of computer-based information in today's commercial environment requires a familiarity with concepts and professional skills from both the legal and computer security fields. Combining these two disciplines is not an easy task. Concepts from the informa
APA, Harvard, Vancouver, ISO, and other styles
5

Kounelis, Ioannis. "Secure and Trusted Mobile Commerce System based on Virtual Currencies." Doctoral thesis, KTH, Kommunikationssystem, CoS, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166701.

Full text
Abstract:
With the widespread usage of mobile devices and their applications, many areas of innovation have created a multitude of opportunities for mobile technologies to be deployed with very interesting effects. One such new area that emerged in the last few years is mobile commerce. It represents a system where various entities create real–life or digital assets, distribute information about them to interested consumers, execute transactions, accept various types of compensation methods, and finally deliver these assets; all of it in a secure and trusted manner, respecting users’ privacy. Since mobi
APA, Harvard, Vancouver, ISO, and other styles
6

Du, Rong. "Secure electronic tendering." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16606/1/Rong_Du_Thesis.pdf.

Full text
Abstract:
Tendering is a method for entering into a sales contract. Numerous electronic tendering systems have been established with the intent of improving the efficiency of the tendering process. Although providing adequate security services is a desired feature in an e-tendering system, current e-tendering systems are usually designed with little consideration of security and legal compliance. This research focuses on designing secure protocols for e-tendering systems. It involves developing methodologies for establishing security requirements, constructing security protocols and using formal
APA, Harvard, Vancouver, ISO, and other styles
7

Du, Rong. "Secure electronic tendering." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16606/.

Full text
Abstract:
Tendering is a method for entering into a sales contract. Numerous electronic tendering systems have been established with the intent of improving the efficiency of the tendering process. Although providing adequate security services is a desired feature in an e-tendering system, current e-tendering systems are usually designed with little consideration of security and legal compliance. This research focuses on designing secure protocols for e-tendering systems. It involves developing methodologies for establishing security requirements, constructing security protocols and using formal
APA, Harvard, Vancouver, ISO, and other styles
8

Söderbergh, Veronica, and Zainab Mahdizadeh. "Handel på Facebook och Instagram : Och faktorer som kan påverka benägenheten till det." Thesis, Högskolan i Borås, Akademin för textil, teknik och ekonomi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-26599.

Full text
Abstract:
Internet är ett ständigt växande fenomen med nya innovationer. Som en följd av utvecklandet av Internet har e-handel uppkommit och då även handel via de sociala mediesidorna Facebook och Instagram. Genom att en stor del av internetanvändare befinner sig på de båda plattformarna kan företag dra nytta av att befinna sig där samt att möjliggöra för konsumenter att kunna handla från dem där för att nå fler människor. Konsumenter kan handel på plattformarna bidra till en ökad smidighet då en produkt kan köpas direkt när den ses i Instagram flödet. Syftet med studien är studera handel på Facebook re
APA, Harvard, Vancouver, ISO, and other styles
9

Cheong, Chi Po. "Efficient and secure card-based payment system based on ANSI X9.59-2006." Thesis, University of Macau, 2007. http://umaclib3.umac.mo/record=b1684528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

SANCHEZ, CASAS YOSELIN MONSERRAT. "PROPUESTA PARA QUE LAS EMPRESAS DEDICADAS A E-COMMERCE USEN EL PROTOCOLO SECURE ELECTRONIC TRANSACTION “SET” PARA BRINDAR SEGURIDAD EN LAS TRANSACCIONES." Tesis de Licenciatura, Universidad Autónoma del Estado de México, 2014. http://hdl.handle.net/20.500.11799/65910.

Full text
Abstract:
La seguridad es un elemento primordial en los sistemas informáticos actuales. Preservar la información y la integridad de un sistema informático es muy importante para una empresa u organización, por lo que en pérdidas económicas y de tiempo podría suponer. Y por tal motivo, es de gran importancia implementar protocolos de seguridad informática en empresas dedicadas a e-commerce para brindar Seguridad en las Transacciones, como en el presente trabajo de investigación, que se propone implementar el Protocolo Secure Electronic Transaction “SET”, que significa Transacción Electrónica Segura. Sie
APA, Harvard, Vancouver, ISO, and other styles
11

Deng, Ni. "A secure, payment-based email delivery system." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Budrionis, Andrius. "Elektroninės komercijos saugumas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20110709_152449-66284.

Full text
Abstract:
Darbe nagrinėjami šiuo metu rinkoje naudojami elektroninių atsiskaitymų modeliai ir jų saugumo problemos. Kadangi elektroninių transakcijų metu operuojama svarbiais ir konfidencialiais duomenimis, aukštesnio saugumo lygio užtikrinimo problema visada išlieka itin aktuali. Darbe išnagrinėtos dažniausiai sutinkamos elektroninių atsiskaitymų schemos (tiesioginis atsiskaitymas ir atsiskaitymas per Paypal sistemą), jų saugumo užtikrinimo principai, technikos ir spragos. Atsižvelgiant į dabartinius rinkos poreikius ir informacijos saugumo spragas šiuo metu naudojamuose modeliuose, suprojektuotas aukš
APA, Harvard, Vancouver, ISO, and other styles
13

Leal, Kleber Anderson Figueiredo. "O documento eletrônico seguro nas transações de compras eletrônicas." Universidade do Estado de Santa Catarina, 2013. http://tede.udesc.br/handle/handle/98.

Full text
Abstract:
Made available in DSpace on 2016-12-01T19:18:35Z (GMT). No. of bitstreams: 1 Sumario e Resumo.pdf: 45506 bytes, checksum: cd9544192e5430afbcb12944adc4244c (MD5) Previous issue date: 2013-04-30<br>Coordenação de Aperfeiçoamento de Pessoal de Nível Superior<br>Resumo protegido
APA, Harvard, Vancouver, ISO, and other styles
14

Horsák, David. "Návrh a implementace elektronického obchodu společnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2008. http://www.nusl.cz/ntk/nusl-221596.

Full text
Abstract:
This diploma work characterizes and analyzes the business company. It contains method of solving problems, consequent on the analysis, solving implementation problems and it is project tools for improve future position of company on market by means of electronic market. For further, it is describe economics analysis of design e-shop and it is implementation in chosen company.
APA, Harvard, Vancouver, ISO, and other styles
15

Azizi, Farnoush, and XiLu Wang. "Your secret weapon to achieve E-Loyalty : A Quantitative Study On Antecedents Leading To E-loyalty." Thesis, Linnéuniversitetet, Institutionen för marknadsföring (MF), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-76083.

Full text
Abstract:
With the rise of e-commerce, more and more retailers switch the focus to online environment. In order to gain customers’ e-loyalty, e-retailers have to pay more attention to e-loyalty itself and its antecedents. To help practitioners and academicians better understand e-loyalty, theory of e-satisfaction, e-trust and perceived value were introduced in this thesis. A conceptual model was structured to further explain the relationships towards e-loyalty. The purpose of this thesis is to explain the relationship of e-loyalty and its antecedents (e-satisfaction, e-trust and perceived value) and ide
APA, Harvard, Vancouver, ISO, and other styles
16

Al-Harby, Fahad M. "Biometric authentication systems for secured e-transactions in Saudi Arabia. An empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4415.

Full text
Abstract:
Security is becoming an increasingly important issue for business, and with it comes the need for appropriate authentication; consequently, it is becoming gradually more important to develop secure e-commerce systems. Fraud via the web, identity theft, and phishing are raising concerns for users and financial organisations. In addition, current authentication methods, like passwords, have many problems (e.g. some users write them down, they forget them, or they make them easy to hack). We can overcome these drawbacks by using biometric authentication systems. Biometric systems are being used f
APA, Harvard, Vancouver, ISO, and other styles
17

Al-Harby, Fahad Mohammed. "Biometric authentication systems for secured e-transactions in Saudi Arabia : an empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4415.

Full text
Abstract:
Security is becoming an increasingly important issue for business, and with it comes the need for appropriate authentication; consequently, it is becoming gradually more important to develop secure e-commerce systems. Fraud via the web, identity theft, and phishing are raising concerns for users and financial organisations. In addition, current authentication methods, like passwords, have many problems (e.g. some users write them down, they forget them, or they make them easy to hack). We can overcome these drawbacks by using biometric authentication systems. Biometric systems are being used f
APA, Harvard, Vancouver, ISO, and other styles
18

Venkataiahgari, Anil Kumar. "Secure e-commerce transactions for multicast services." Thesis, 2005. http://spectrum.library.concordia.ca/8727/1/MR14340.pdf.

Full text
Abstract:
With the advent of an increasing number of multicast services such as audio/video streaming, news broadcast and software distribution, accounting for the resources consumed by subscribers becomes essential. However, multicast environments are inherently more susceptible to attacks because there is as yet no proper foundation for securing multicast networks. However, any e-commerce operational environment requires support for the security properties such as authentication, authorization, data confidentiality, and non-repudiation. As secured multicast services gain popularity in the Internet, at
APA, Harvard, Vancouver, ISO, and other styles
19

Yu, Min-Chieh. "A secure mobile agent e-commerce protocol." Thesis, 2015. http://hdl.handle.net/1805/10117.

Full text
Abstract:
Indiana University-Purdue University Indianapolis (IUPUI)<br>There are many advantages of mobile agent such as delegation of tasks, asynchronous processing, adaptable service in interfaces, and code shipping. Mobile agents can be utilized in many areas such as electronic commerce, information retrieval, network management, etc. The main problem with mobile agents is security. The three basic security design goals of a system are confidentiality, integrity, and availability. The goal of this thesis concerns the property of secure purchasing by mobile agents. First present Jalal's anonymous aut
APA, Harvard, Vancouver, ISO, and other styles
20

WU, HSIAO-LING, and 吳曉玲. "Secure Authentication Schemes for E-commerce Applications." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/p8pgvj.

Full text
Abstract:
博士<br>逢甲大學<br>資訊工程學系<br>106<br>The authentication scheme always plays an important role in providing a secure communication channel for the electronic-commerce environment. In addition, authentication schemes ensure that only the authorized clients can access services from the server. Generally speaking, this type of scheme is composed of two parts: (1) mutual authentication and (2) session key agreement. Recently, various kinds of electronic-commerce systems have different essential requirements. There is no such security scheme that suits all the electronic-commerce systems. In this diss
APA, Harvard, Vancouver, ISO, and other styles
21

Kang, Cheng-Chang, and 康振昌. "Build a more secure environment for e-commerce transactions." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/93417523576404100775.

Full text
Abstract:
碩士<br>淡江大學<br>資訊工程學系碩士在職專班<br>99<br>Implementing electronic transaction data security mechanism (such as SSL and SET) upon e-commerce web servers is to ensure data communication privacy via protecting the transaction data from being stolen or changed in the transmission process。While malicious attacks of stealing or changing transaction data on e-commerce web servers are still happening。When web programs are accessing or manipulating on the database, the malicious attacking program would use this weak point and effect the attack if there is no examination of web page variable data in the trans
APA, Harvard, Vancouver, ISO, and other styles
22

Mapeka, Kgabo Elizabeth. "An incremental approach to a secure e-commerce environment." Thesis, 2014. http://hdl.handle.net/10210/12326.

Full text
Abstract:
M.Sc. (Computer Science)<br>The terms "Electronic Commerce" and "Internet Commerce" are often used interchangeably to mean similar processes. By definition, electronic commerce (e-commerce) means any exchange of information that occurs electronically. There are various types of electronic commerce transactions to name a few; electronic data interchange (EDI), fax, electronic funds transfer, interorganisational systems, technical data and document exchange, customer credit approval systems, interaction with customers and vendors, etc ([151, p. 27). The term internet commerce evolved with the er
APA, Harvard, Vancouver, ISO, and other styles
23

Chen, Tsung-Pao, and 陳宗保. "A Study on Secure Mobile E-Commerce with Self-Certified Public Key Cryptosystems." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/93634512387105242263.

Full text
Abstract:
碩士<br>大葉大學<br>資訊管理研究所<br>89<br>At present, all of electronic commerce activities constructed on the Internet employ the certificate-based public key cryptosystem to solve their related security issues. However, as compared with the conventional electronic commerce, the promising mobile electronic commerce environment has many different characteristics, including the less network bandwidth and electronic power, the greater transmission delay time, the more unstable network connection, the less computing capacity, etc. Therefore, the certificate-based public key cryptosystem needing more computi
APA, Harvard, Vancouver, ISO, and other styles
24

Lee, Ing-Chung, and 李英宗. "An Agent-Based Secure E-Commerce Environment with Distributed Authentication and Authorization Services." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/55842758319640696035.

Full text
Abstract:
碩士<br>國立政治大學<br>資訊科學學系<br>89<br>This thesis describes an agent-based secure E-Commerce environment with distributed authentication and authorization services. The previous researches about security issues in agent-mediated E-commerce do not solve the problems of deals with strangers. We merge role based access control (RBAC) concept for adapting the certificates to different business models or new content-based network. Several types of agent delegation mechanism based on our role certificates and some considerations about how to achieve agent trust management with policies both in logics and
APA, Harvard, Vancouver, ISO, and other styles
25

Lu, James, and 呂俊超. "Integration of a Secure B2B E-commerce Protocol for International Trade into the Internet Open Trading Protocol." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/16713341271558573081.

Full text
Abstract:
碩士<br>國立中興大學<br>資訊科學研究所<br>93<br>In the recent year the develop of the internet and information technology made a lot of new e-businesses environment. business organizations have been interacting in international trade and business-to-business (B2B) scenarios to reach their goals. Companies need to exchange data with their trading partners to conduct business. Exchanging data electronically has many advantages over manual transmission. The most important advantage is the ability to automate business processes. Some other advantages are timeless, traceability, reliability, scalability and secur
APA, Harvard, Vancouver, ISO, and other styles
26

Wang, Jain-Hong, and 王建閎. "Using eD2k Technology to Build a Secure P2P E-Commerce System-A Case Study of Plain People Music Website." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/67167916923012784853.

Full text
Abstract:
碩士<br>逢甲大學<br>資訊工程所<br>99<br>The popularization of the Internet and world wide web(www) not only changed the circulation of information but also springing up E-Commerce which was traded in the mode of electronic digitizing and has become the most powerful in marketing all over the world. During the last several decades, there has been a rapid growth of E-Commerce due to the development of information technology, and there&apos;&apos;s a tremendous wave of brand new internet commercial operation model such as YouTube, Flicker, and Face book. As a result, the business model of Peer to Peer(P2P)
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!