Abstract
In this article, we present the way toward a security EC transaction on Web. The Internet and electronic commerce offer endless possibilities and opportunities to business of all sizes as well as convenience to consumers. These benefits are not reaped without danger for merchants and consumers. When a purchase list or an invoice is created it may get infected with some modification by intruder before the signature is attached to it. We proposed a signature scheme that let one can sign right in atomic step after creation for a security EC transaction on Web protocol. We have seen how electronic commerce accommodates the increasing consumer appetite for online shopping and Internet trade using the EC-Web server as the enabler. The data with some modification by intruder can be detected by EC-Web server or mobile agent. Besides that, we also proposed the message recovery capability to recover the original purchase list to save the infected files. The most natural extension of our protocol scheme that the mobile agent with anonymous property for mobile agent. The mobile agent use random id to purchase on EC Web. The EC-Web server can check random id is legal group member or not, with EC application packages will allow mobile agent and EC-Web server to commit themselves to one another. Security is the critical backdrop that must be in the place for our EC transaction on Web protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ginige, A., Murugesan, S.: Web Engineering: An Introduction. J. of IEEE MultiMedia, 14–18 (January 2001)
Young, A., Yung, M.: Auto-Recoverable Auto-Certifiable Cryptosystems. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 17–31. Springer, Heidelberg (1998)
Schoenmakers, B.: A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 148–164. Springer, Heidelberg (1999)
Manchala, D.W.: E-Commerce Trust Metrics and Models. J. of IEEE Internet Computing, 36–44 (March 2000)
Lim, J.B., Hurson, A.R.: Transaction order processing in Mobile, Heterogeneous Database Systems. IEEE Trans. On Knowledge and data Engineering 14(6), 1330–1346 (2002)
Nyberg, K., Rueppel, R.A.: Message recovery for signature scheme based on the discrete logarithm problem. Designs, Codes and Cryptography (7), 61–81 (1996)
Usuda, K., Mambo, M., Uyematsu, T., Okamoto, E.: Proposal of an automatic signature scheme using a Web-based platform. IEICE Trans. Fundamentals E79-A (1), 94–101 (1996)
Sherwood, R., Bhattacharjee, B., Srinivasan, A.: A Protocol for Scalable Anonymous Communication. In: Proc. the IEEE Symposium on Security and Privacy, pp. 1–12 (2002)
Maurer, U.: Information-Theoretic Cryptography. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 47–65. Springer, Heidelberg (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lin, W.D. (2003). Toward a Security EC Transaction on Web. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds) E-Commerce and Web Technologies. EC-Web 2003. Lecture Notes in Computer Science, vol 2738. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45229-4_12
Download citation
DOI: https://doi.org/10.1007/978-3-540-45229-4_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40808-6
Online ISBN: 978-3-540-45229-4
eBook Packages: Springer Book Archive