Systematic Review of Issues and Solutions for Security in E-commerce

RK Jamra, B Anggorojati, DI Sensuse… - 2020 International …, 2020 - ieeexplore.ieee.org
E-commerce popularity is growing rapidly all over the world, driven by technology and
customer's needs. However, the development of e-commerce is not in line with the security …

[PDF][PDF] RSA and ECC: A comparative analysis

D Mahto, DK Yadav - International journal of applied engineering …, 2017 - researchgate.net
This paper presents a comparative analysis of RSA (Rivest Shamir Adleman) and ECC
(Elliptic Curve Cryptography). In the current digital world and public-key cryptography …

[PDF][PDF] Security analysis of elliptic curve cryptography and RSA

D Mahto, DA Khan, DK Yadav - Proceedings of the world congress on …, 2016 - iaeng.org
Internet has revolutionized the data communication systems. It provides platform to get the
information exchanged quickly amongst the communicating parties at the same time it also …

[PDF][PDF] Performance analysis of RSA and elliptic curve cryptography.

D Mahto, DK Yadav - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
This paper presents a performance study and analysis of two popular public-key
cryptosystems: RSA with its two variants, and ECC (Elliptic Curve Cryptography). RSA is …

Digital signature authentication for a bank using asymmetric key cryptography algorithm and token based encryption

R Karim, LS Rumi, M Ashiqul Islam, AA Kobita… - … Computing and Mobile …, 2021 - Springer
Nowadays security system is being with more important issues. In modern science,
technology is updated day by day and we are getting insecure in our daily life. Through this …

A comparative study of frequentist vs Bayesian A/B testing in the detection of E-commerce fraud

JC Westland - Journal of Electronic Business & Digital Economics, 2022 - emerald.com
Purpose This paper tests whether Bayesian A/B testing yields better decisions that
traditional Neyman-Pearson hypothesis testing. It proposes a model and tests it using a …

A review on noisy password, voiceprint biometric and one-time-password

KK Kumbhare, KV Warkar - Procedia Computer Science, 2016 - Elsevier
In this paper, we review the Noisy password, Voiceprint biometric and One-Time-Password.
The most common method used for authentication is static passwords. The traditional …

[PDF][PDF] The AES-256 cryptosystem resists quantum attacks

S Rao, D Mahto, DK Yadav, D Khan - Int. J. Adv. Res. Comput. Sci, 2017 - researchgate.net
Privacy of information can be maintained using two cryptographic techniques ie symmetric
key cryptography and asymmetric key cryptography. For securing data using symmetric key …

Lightweight authentication scheme based on Elliptic Curve El Gamal

S Baccouri, H Farhat, T Azzabi… - Journal of Information and …, 2024 - Taylor & Francis
ABSTRACT Elliptic Curve Cryptography (ECC) is a promising cryptosystem as it presents
the ideal choice for implementing public-key cryptography in resource-limited devices, such …

Data security system for a bank based on two different asymmetric algorithms cryptography

M Ashiqul Islam, AA Kobita, M Sagar Hossen… - … Computing and Mobile …, 2021 - Springer
Recently, a strong security system is very important for a safe banking system. To prevent
hacking of important information of bank and client, a secure banking system is a must. This …