4 Security, Cryptography and Electronic Commerce

December 1999
Hume Papers on Public Policy;1999, Vol. 7 Issue 4, p57
Academic Journal
Focuses on security and cryptography in electronic commerce. Requirements of writing; Requirements for signatures; Nature of encryption.


Related Articles

  • Web Woes. Wolfe, Daniel // American Banker;1/7/2009, Vol. 174 Issue 4, p5 

    The article focuses on a new method of forging Web security certificates that could put some electronic commerce transactions at risk and was discovered by researchers in 2009. The certificates are typically used by consumers to verify the legitimacy of things such as merchant Web sites....

  • Cryptography and the New Economy. Lee, Tom // Industrial Physicist;Aug2000, Vol. 6 Issue 4, p29 

    Focuses on the role of cryptography as vehicle for securing public confidence in the safety of electronic commerce transactions in the United States. Categories of mathematical cryptography; Elements for commercial application of cryptography; Issue for the transaction safety in the presence of...

  • 'Simplify' Clue Guiding the Password Game. Kingson, Jennifer A. // American Banker;5/16/2001, Vol. 166 Issue 94, p18 

    Reports that SingleSignOn.Net is selling a system, and an appliance that goes with it, that lets banks and their partners let customers choose a single password that works across all channels and Web sites and that could be secured by public key infrastructure or digital signatures. Problem of...

  • How Strong Are Your Passwords? Fordham, David R. // Strategic Finance;May2008, Vol. 89 Issue 11, p42 

    The article examines computer user identification and passwords as vulnerabilities to identity theft when engaged in electronic commerce. There is an inherent tension between the need to keep passwords accessible and secure. Suggestions on how to create and remember "strong" passwords which have...

  • Remote Access Control, Security a Top Priority.  // Security: Solutions for Enterprise Security Leaders;Feb99, Vol. 36 Issue 2, p61 

    Presents a survey on top information security issues at the Bellcore/Global Integrity SecureComm 98 Conference in the United States. Ability of security infrastructure to support electronic commerce activities; Implementation of remote access; Extension of networks to support business partner...

  • Warding off hacker attacks. Woods, Bob // Catalog Age;Apr2000, Vol. 17 Issue 5, p49 

    Focuses catalog marketing companies' efforts to improve their electronic commerce security measures as of April 2000. Security problems posed by hacker attacks.

  • PKI enables digital signatures. Hammar, Sven // Network World;10/30/2000, Vol. 17 Issue 44, p61 

    Discusses the role of public-key infrastructure (PKI) technology in electronic business security in the United States. Benefit of PKI to electronic transactions; Use of cryptographic keys; Explanation of how PKI works.

  • SECURITY: A KEY CHALLENGE. Joch, Alan; Chen, Anne // eWeek;11/13/2000, Vol. 17 Issue 46, p102 

    Reports on how companies engaged in electronic commerce, which were included in 'EWeek' magazine's FastTrack 500 list, approach computer security issues in the United States. Security threats facing electronic-commerce companies; Business losses from security breaches; Tools for enhancing...

  • Will this be the year of public key security? Past and present join to suggest what's next. McClure, Stuart; Scambray, Joel // InfoWorld;04/10/2000, Vol. 22 Issue 15, p49 

    Comments on the issues related to public key security of electronic commerce. History of electronic security; Views of cryptographers Bruce Schneier and Carl Ellison on public key infrastructure.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics