Abstract:
The security problems in electronic commerce in transactions are very evident in public companies. The objective of this research is to analyze security algorithms and pr...Show MoreMetadata
Abstract:
The security problems in electronic commerce in transactions are very evident in public companies. The objective of this research is to analyze security algorithms and protocols to mitigate risks and vulnerabilities within commercial transactions that help us identify computer attacks, whether internal or external. Deductive method and exploratory research were used to analyze the information from the reference articles and information available online; regarding different types of protocols and algorithms that protect the information in its entirety and confidentiality, thus providing the respective security to the information of public companies. It resulted in a control of the security and privacy factors, by having RSA algorithms with formulas to encrypt and decrypt public keys, combinations of commercial transactions, asymmetric and symmetric cryptography and the SET protocol, which facilitates the algorithms in decision-making within the organizations. It was concluded that the SET protocol is the best in facilitating greater security to mitigate vulnerabilities, threats and risks of its processes in public organizations.
Date of Conference: 18-20 September 2020
Date Added to IEEE Xplore: 15 February 2021
ISBN Information: