Elliptic curve cryptography on SET for E-commerce

Po Hsian Huang, Der Jiunn Deng, Whe Dar Lin

Research output: Contribution to journalArticle

Abstract

There are many threats from virus, hacker, electronic eavesdropper, and electronic deceiver in the network. The growth of the computer system and network makes the organizations and personal users to depend on the information that circulate in these systems more and more. This makes us be aware of that protecting the data and resources from leak, insuring the reliability of data and information, and protecting the system from suffering the hit from network are very important. Submit a cryptography that is affirmative by people to reach the demand on the safety of SET system. The algorithm submitted is public, and everyone can use and to verify its safety, using Elliptic Curve Cryptography to execute the key exchange and encryption decryption, and making sure its performance of SET is better while the safety of SET is same as before, and the overload of compute and transmission is yet lower.

Original languageEnglish
Pages (from-to)827-834
Number of pages8
JournalJournal of Internet Technology
Volume13
Issue number5
Publication statusPublished - 2012 Dec 1

Fingerprint

Electronic commerce
Cryptography
Computer networks
Viruses
Computer systems

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications

Cite this

Huang, Po Hsian ; Deng, Der Jiunn ; Lin, Whe Dar. / Elliptic curve cryptography on SET for E-commerce. In: Journal of Internet Technology. 2012 ; Vol. 13, No. 5. pp. 827-834.
@article{1ce513e7890743a9892b55f5667abd0b,
title = "Elliptic curve cryptography on SET for E-commerce",
abstract = "There are many threats from virus, hacker, electronic eavesdropper, and electronic deceiver in the network. The growth of the computer system and network makes the organizations and personal users to depend on the information that circulate in these systems more and more. This makes us be aware of that protecting the data and resources from leak, insuring the reliability of data and information, and protecting the system from suffering the hit from network are very important. Submit a cryptography that is affirmative by people to reach the demand on the safety of SET system. The algorithm submitted is public, and everyone can use and to verify its safety, using Elliptic Curve Cryptography to execute the key exchange and encryption decryption, and making sure its performance of SET is better while the safety of SET is same as before, and the overload of compute and transmission is yet lower.",
author = "Huang, {Po Hsian} and Deng, {Der Jiunn} and Lin, {Whe Dar}",
year = "2012",
month = "12",
day = "1",
language = "English",
volume = "13",
pages = "827--834",
journal = "Journal of Internet Technology",
issn = "1607-9264",
publisher = "Taiwan Academic Network Management Committee",
number = "5",

}

Huang, PH, Deng, DJ & Lin, WD 2012, 'Elliptic curve cryptography on SET for E-commerce', Journal of Internet Technology, vol. 13, no. 5, pp. 827-834.

Elliptic curve cryptography on SET for E-commerce. / Huang, Po Hsian; Deng, Der Jiunn; Lin, Whe Dar.

In: Journal of Internet Technology, Vol. 13, No. 5, 01.12.2012, p. 827-834.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Elliptic curve cryptography on SET for E-commerce

AU - Huang, Po Hsian

AU - Deng, Der Jiunn

AU - Lin, Whe Dar

PY - 2012/12/1

Y1 - 2012/12/1

N2 - There are many threats from virus, hacker, electronic eavesdropper, and electronic deceiver in the network. The growth of the computer system and network makes the organizations and personal users to depend on the information that circulate in these systems more and more. This makes us be aware of that protecting the data and resources from leak, insuring the reliability of data and information, and protecting the system from suffering the hit from network are very important. Submit a cryptography that is affirmative by people to reach the demand on the safety of SET system. The algorithm submitted is public, and everyone can use and to verify its safety, using Elliptic Curve Cryptography to execute the key exchange and encryption decryption, and making sure its performance of SET is better while the safety of SET is same as before, and the overload of compute and transmission is yet lower.

AB - There are many threats from virus, hacker, electronic eavesdropper, and electronic deceiver in the network. The growth of the computer system and network makes the organizations and personal users to depend on the information that circulate in these systems more and more. This makes us be aware of that protecting the data and resources from leak, insuring the reliability of data and information, and protecting the system from suffering the hit from network are very important. Submit a cryptography that is affirmative by people to reach the demand on the safety of SET system. The algorithm submitted is public, and everyone can use and to verify its safety, using Elliptic Curve Cryptography to execute the key exchange and encryption decryption, and making sure its performance of SET is better while the safety of SET is same as before, and the overload of compute and transmission is yet lower.

UR - http://www.scopus.com/inward/record.url?scp=84872280835&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84872280835&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:84872280835

VL - 13

SP - 827

EP - 834

JO - Journal of Internet Technology

JF - Journal of Internet Technology

SN - 1607-9264

IS - 5

ER -