References: [1] Ahmed, K., Alam, Md. S. (2015). E-Commerce Security Through ECC, International Conference on Information Security & Privacy, Nagpur, India. [2] Issues of Security and Privacy in Electronic Commerce. www.cs.virginia.edu. [3] Lal Das, M., Samdaria, N. (2014). On the Security of SSLTLS Enabled Applications, Elsevier, 2014. [4] Haidari, A., Paktiani, K. (2011). A Study About Trust and Security Within E-Commerce, University of Gothenburg, Sweden. [5] Ladan, M. I. (2014). E-commerce Security Issues, International Conference on Future Internet of Things and Cloud, 2014. [6] Lai, S.-T., Leu, F.-Y., Chu, W. C.-C. (2014). A Multi-Layer Secure Prevention Scheme for Improving E-commerce Security, Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IEEE, 2014. [7] Dykert, L., et. al. (2002). E-Business-för Tillväxt Och Lönsamhet, Lund, Studentlitteratur, 2002. [8] Kraft, T. A., Kakar, R. (2009). E-commerce Security, In: Proceedings CONISAR, Washington DC, 2009. [9] Xuehui, J. (2013). Research on the Security of Electronic Commerce Based on Computer Network, Fourth International Conference on Intelligent Systems Design and Engineering Applications, IEEE, 2013. [10] Marchany, R. C., Tront, J.G. (2002). E-commerce Security Issues, 35th Hawaii International Conference on System Sciences, 2002. [11] Perera, A. C., Kesavan, K., Bannakkotuwa, S.V. (2016). ECommerce (WEB) Application Security: Defense Against Reconnaissance, In: IEEE International Conference on Computer and Information Technology, 2016. [12] Reza Farshchi, S.M., Gharib, F., Ziyaee, R. (2011). Study of Security Issues on Traditional and New Generation of Ecommerce Model, In: International Conference on Software and Computer Applications IPCSIT, 9, IACSIT Press, Singapore, 2011. [13] Reza Farshchi, S.M., Gharib, F., Ziyaee, R. (2011). Study of Security Issues on Traditional and New Generation of Ecommerce Model, International Conference on Software and Computer Applications, 2011. [14] W3C Working Group Note. (2004). Web services architecture, http://www.w3c.org/TR/ws-arch, 2004. [15] Yasin, S., Haseeb, K., Qureshi, R. J. (2012). Cryptography Based E-commerce Security: A Review, IJCSI International Journal of Computer Science Issues, 9 (2) 1 March 2012. [16] Chaudhary, A., Ahmad, K., Rizvi, M. A. (2014). E-commerce Security Through Asymmetric Key Algorithm, Fourth International Conference on Communication Systems and Network Technologies, IEEE, 2014. [17] Niranjanamurthy, M., Dharmendra Chahar, D. R. (2013). The Study of E-Commerce Security Issues and Solutions, International Journal of Advanced Research in Computer and Communication Engineering, 2 (7) July 2013. [18] Dr. Nada, Al-Slamy, M. A. (2008). E-Commerce Security, IJCSNS International Journal of Computer Science and Network Security, 8 (5), May 2008. [19] IBM, Microsoft, Verisign. (2002). WS-Security Specification 1.0", 2002, http://www.ibm.com/developerworks/library/wssecure. [20] Zhu, F., Li, G. (2011). Study on Security of Electronic Commerce Information System, IEEE, 2011. |