Font Size: a A A

Study On The Securities In Electronic Commerce

Posted on:2005-12-09Degree:MasterType:Thesis
Country:ChinaCandidate:Y L ChenFull Text:PDF
GTID:2168360122496834Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development and extensive application of Internet, more and more business activities are running on internet and a great deal of economic information is transferring on internet as well. At the same time, threats are coming accordingly. The intruders, fakers and hackers of network are running secretly and crimes of network continuously occurring. Therefore, the security problem has become the focus of people's attention in all the electronic commerce issues.The main security threats faced by electronic commerce are as following: the information being intercepted and captured during the transmission on network; the transmitted document being tampered with; the forgery of e-mails; the counterfeit of other's identity and the nonrecognition of done deal etc. These threats will seriously affect the application and popularization of electronic commerce if they can't be solved effectively.According to system structure of electronic commerce security, the thesis made a deep anatomy of the threats from various levels of network service, encrypting technique, security authentication, deal protocol and business system respectively and put forward some improving measures. In chapter 2, the system structure of electronic commerce security technique was put forward from the angel of levels. In chapter 3, the security of electronic commerce operating on TCP/IP network was studied; a new type of firewall based on intelligentized defense was put forward; the justice of network service was analyzed and the overall barrage rate of network was decreasing incessantly according to QoS Rout Algorism. In chapter 4, high-level encrypting algorism was realized by code C and deal protocol was chosen by comparison in order to prevent counterfeit identity and denying of a deal. In chapter 5, the application of watermark technique in electronic commerce was discussed and a kind of safe and effective watermark algorism was realized on the basis of theory and practice.
Keywords/Search Tags:electronic commerce, network security, high-level encrypting algorism, digital watermark
PDF Full Text Request
Related items