Redirigiendo al acceso original de articulo en 20 segundos...
Inicio  /  Future Internet  /  Vol: 15 Par: 8 (2023)  /  Artículo
ARTÍCULO
TITULO

Applying Detection Leakage on Hybrid Cryptography to Secure Transaction Information in E-Commerce Apps

Mishall Al-Zubaidie and Ghanima Sabr Shyaa    

Resumen

Technology advancements have driven a boost in electronic commerce use in the present day due to an increase in demand processes, regardless of whether goods, products, services, or payments are being bought or sold. Various goods are purchased and sold online by merchants (M" role="presentation" style="position: relative;">MM M )s for large amounts of money. Nonetheless, during the transmission of information via electronic commerce, M" role="presentation" style="position: relative;">MM M s? information may be compromised or attacked. In order to enhance the security of e-commerce transaction data, particularly sensitive M" role="presentation" style="position: relative;">MM M information, we have devised a protocol that combines the Fernet (FER) algorithm with the ElGamal (ELG) algorithm. Additionally, we have integrated data leakage detection (DLD) technology to verify the integrity of keys, encryptions, and decryptions. The integration of these algorithms ensures that electronic-commerce transactions are both highly secure and efficiently processed. Our analysis of the protocol?s security and performance indicates that it outperforms the algorithms used in previous studies, providing superior levels of security and performance.

 Artículos similares

       
 
Tomotaka Fukuoka and Makoto Fujiu    
In Japan, bridges are inspected via close visual examinations every five years. However, these inspections are labor intensive, and a shortage of engineers and budget constraints will restrict such inspections in the future. In recent years, efforts have... ver más
Revista: Buildings

 
Atsushi Suzuki, Wang Liao, Daiki Shibata, Yuki Yoshino, Yoshihiro Kimura and Nobuhiro Shimoi    
With demand for the long-term continued use of existing building facilities, structural health monitoring and damage detection are attracting interest from society. Sensors of various types have been practically applied in the industry to satisfy this ne... ver más
Revista: Buildings

 
Xiaolong Zhou, Taoxin Deng, Li Chen, Jie Chen, Ao Li, Qijie Yuan, Wei Fang and Jianfeng Gu    
In the construction process of large-scale bridges, there are uncertainties and time-varying factors in the environment and construction loads. It is difficult to make accurate estimates of the theoretical calculation models of construction control in ad... ver más
Revista: Buildings

 
Mario Aragonés Lozano, Israel Pérez Llopis and Manuel Esteve Domingo    
The number and the diversity in nature of daily cyber-attacks have increased in the last few years, and trends show that both will grow exponentially in the near future. Critical Infrastructures (CI) operators are not excluded from these issues; therefor... ver más

 
Somayeh Labafi, Sanee Ebrahimzadeh, Mohamad Mahdi Kavousi, Habib Abdolhossein Maregani and Samad Sepasgozar    
Evidence-based policy seeks to use evidence in public policy in a systematic way in a bid to improve decision-making quality. Evidence-based policy cannot work properly and achieve the expected results without accurate, appropriate, and sufficient eviden... ver más