Elliptic curve cryptography on SET for E-commerce

Po Hsian Huang, Der Jiunn Deng, Whe Dar Lin

Research output: Contribution to journalArticlepeer-review


There are many threats from virus, hacker, electronic eavesdropper, and electronic deceiver in the network. The growth of the computer system and network makes the organizations and personal users to depend on the information that circulate in these systems more and more. This makes us be aware of that protecting the data and resources from leak, insuring the reliability of data and information, and protecting the system from suffering the hit from network are very important. Submit a cryptography that is affirmative by people to reach the demand on the safety of SET system. The algorithm submitted is public, and everyone can use and to verify its safety, using Elliptic Curve Cryptography to execute the key exchange and encryption decryption, and making sure its performance of SET is better while the safety of SET is same as before, and the overload of compute and transmission is yet lower.

Original languageEnglish
Pages (from-to)827-834
Number of pages8
JournalJournal of Internet Technology
Issue number5
Publication statusPublished - 2012 Dec 1

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Elliptic curve cryptography on SET for E-commerce'. Together they form a unique fingerprint.

Cite this