Ghosh, 1998 - Google Patents
E-Commerce security: No Silver BulletGhosh, 1998
- Document ID
- 17181176250634629447
- Author
- Ghosh A
- Publication year
- Publication venue
- Database Security XII: Status and Prospects
External Links
Snippet
Electronic commerce has come out of its infancy, re-buffed its nay-sayers, and is now a multi- billion dollar industry. The success of early adopters in electronic commerce has now led the pragmatist herd in participating in on-line commerce. It is now a staple of advertising to …
- 241000522213 Dichilus lebeckioides 0 title description 9
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8626935B1 (en) | Identifying use of software applications | |
Goncharov | Russian underground 101 | |
US20080028444A1 (en) | Secure web site authentication using web site characteristics, secure user credentials and private browser | |
Wright et al. | Cyber security and mobile threats: The need for antivirus applications for smart phones | |
Sengupta et al. | e-Commerce security—A life cycle approach | |
Wedman et al. | An analytical study of web application session management mechanisms and HTTP session hijacking attacks | |
Nabi | Secure business application logic for e-commerce systems | |
Khan | Research Article E-banking: Online Transactions and Security Measures | |
Ghosh | E-Commerce security: No Silver Bullet | |
Gottipati | A proposed cybersecurity model for cryptocurrency exchanges | |
Weiss | CompTIA Security+ SY0-601 Exam Cram | |
Ankele et al. | SoK: Cyber-Attack Taxonomy of Distributed Ledger-and Legacy Systems-based Financial Infrastructures | |
Wueest | The state of financial Trojans 2014 | |
Al-Dwairi et al. | Business-to-consumer e-commerce Web Sites: Vulnerabilities, Threats and quality evaluation model | |
Gupta et al. | Server side protection against cross site request forgery usingcsrf gateway | |
Mihai | Overview on phishing attacks | |
Orucho et al. | Assessing Operation of Mobile Banking Applications that Support Customers to Access Banking Services Remotely | |
MACENA | CYBER SECURITY AND DATA PROTECTION | |
Nidhyananthan et al. | Cyber Profiteering in the Cloud of Smart things | |
Thanki et al. | Online Banking Operating Pattern and Risk of Cyber Fraud-Findings from Empirical Research | |
Rijah et al. | Security Issues and Challenges in Windows OS Level | |
Liu | An Investigation of Cryptojacking: Malware Analysis and Defense Strategies | |
Sharma et al. | Web Security Analysis of Banking Websites | |
O’Regan | Cybersecurity and Cybercrime | |
Mooney et al. | Your Guide to Authenticating Mobile Devices |