Integration of Quantum Cryptography  
  Authors : Santosh Kumar Das; Hari Ram Swamy; B.Giridhar; Chandan Kumar Giri

 

Nowadays electronic commerce services have risen to become more and more popular on Internet and Web environment. Exchange security on network is very important for e-commerce service and it is always the key factor that affects the success of electronic commerce (e-commerce). In this paper, we discuss some security related issues about traditional and new generation of e-commerce model, such as authentication, authorization, non-repudiation, and integrity in P2P model; moreover, we discuss some trust models in P2P e-commerce. By analyzing the main features of P2P e-commerce, we sum up some design principles of trust model in P2P e-commerce. We provide a thorough overview about the network security issues that surround e-commerce and e-commerce applications and propose a corresponding research framework for security in ecommerce. We believe that as long as the security issues are adequately addressed, the P2P e-commerce would achieve great success in the future e-commerce markets in comparison to other security methods.

 

Published In : IJCAT Journal Volume 1, Issue 9

Date of Publication : 31 October 2014

Pages : 492 - 497

Figures :03/p>

Tables : --

Publication Link : Integration of Quantum Cryptography

 

 

 

Santosh Kumar Das : B.Tech Student

Hari Ram Swamy : B.Tech Student

B.Giridhar : Asst.prof in CSE dept

Chandan Kumar Giri : Asst.prof in CSE dept

 

 

 

 

 

 

 

Communication Security

Network Security

P2P Model

E-Commerce Security

A lot of research on e-commerce security is going on and many security products and systems of ecommerce are being developed and marketed. In this situation, it is important to note that security is a system property of the e-commerce. The best we can do is to show that a specific system is resistant against a set of well-known attacks.

 

 

 

 

 

 

 

 

 

[1] Yuan sen. Introduction of E-Bunsiness Security Technology. Software Publication, BeiJing. 2009. [2] Peng Xinying. Research on e-bunsiness security. Gansu Science and technology, 2009, 25(2): 43-45. [3] Feilong PENG. A trust model for e-commerce based on XKMS. Computer Applications and Software, 2008, 25(1):140-142. [4] Qi XIE, Lihong ZHAO. Research and realization of web services security. Computer Engineering and Design, 2007, 28(1): 4366-4368. [5] Zhu Lingxi. E-Bunsiness Security. BeiJing. Beijing Jiaotong University. 2006. [6] W3C Working Group Note, “Web services architecture”, http://www.w3c.org/TR/ws-arch, 2004. [7] IBM,Microsoft,Verisign,“WS-Security Specification1.0”,http://www.ibm.com/developerworks/l ibrary/wssecure, 2002. [8] Sheila Frankel and Ray Perlner “Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration” International Journal Network Security & Its pplications (IJNSA), Vol 1, No 2, July 2009. [9] C. Elliott, D. Pearson, and G. Troxel, "Quantum cryptography in practice," Karlsruhe, Germany: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications 2003. [10] Alan Mink, dbart and S Wiesner, “Quantum cryptography or unforgeable subway tokens Advances in Cryptology” Proceedings of Crypto.August 1982 [11] Nelson, B., Phillips, A., Enfinger, F., and Steuart, C. Guide to Computer Forensics and Investigations.Boston:Thomson Course Technology, 2004.articles/cryptography/introduction-to-modern. [12] Charles H. Bennett, “Quantum Cryptography Using Any Two Nonorthogonal States”,IBM Rearch Division,T.J. Watson Research Center, Yorktown Heights,New York 10598 [13] Gerald Scharitzer, “Basic Quantum Cryptography” Vienna University of technology, Institute of Automation. [14] Bennett C H G Brassard S Brei[1] C.-H. F. Fung, K. Tamaki, and H.-K. Lo, "Performance of two quantum keydistribution Protocols," Phys. Rev.vol. 73, 2006.