Skip to main content

The Application of Information Encrypted in E-commerce Security

  • Conference paper
  • First Online:
Advances in Electronic Engineering, Communication and Management Vol.1

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 139))

Abstract

As the development of e-commerce is affecting all aspects of people’s lives, leading the network information security requirements to become increasingly high, so as the security of ourselves in the network activities. Application of information encryption technology will ensure the confidential requirements of the information in network activities and some relevant information. This paper begins from the introduction of encryption technology and presented to a new assume of the RSA algorithm, listing some applied examples of information encryption technology, emphasizes the importance of encryption technology in maintenaning security of network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jing, J.: Information systems security and confidentiality. Tsinghua University Press (2005)

    Google Scholar 

  2. Peng, C.: The discuss about e-commerce security solutions. Hunan Radio and TV University (2009)

    Google Scholar 

  3. Deng, Z., Zhu, Q.: Network Security Training tutorial. People Post Press (2005)

    Google Scholar 

  4. Huang, Z.: Modern computer information security technology. Metallurgical Industry Press, Beijing (2005)

    Google Scholar 

  5. Wang, S.: On the e-commerce security data encryption technology. Communication Technology (2008)

    Google Scholar 

  6. Huang, Z.: Modern computer information security technology (2005)

    Google Scholar 

  7. Zhao, S.: On the e-commerce network security issues and countermeasures. China Scientific & Technical (2009)

    Google Scholar 

  8. Deng, Z., Zhu, Q.: Network Security Training tutorial. People Post Press (2005)

    Google Scholar 

  9. Liu, W., Xing, Y.: On the network security of e-commerce development and countermeasures. Modern shopping malls (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, Z., Ying, S. (2012). The Application of Information Encrypted in E-commerce Security. In: Jin, D., Lin, S. (eds) Advances in Electronic Engineering, Communication and Management Vol.1. Lecture Notes in Electrical Engineering, vol 139. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27287-5_79

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27287-5_79

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27286-8

  • Online ISBN: 978-3-642-27287-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics