A fast software one-way hash function
Journal of Cryptology
Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem
Designs, Codes and Cryptography - Special issue dedicated to Gustavus J. Simmons
E-Commerce Trust Metrics and Models
IEEE Internet Computing
Guest Editors' Introduction: Web Engineering An Introduction
IEEE MultiMedia
Transaction Processing in Mobile, Heterogeneous Database Systems
IEEE Transactions on Knowledge and Data Engineering
Efficient Identification and Signatures for Smart Cards
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
P5: A Protocol for Scalable Anonymous Communication
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
An increase web services performance method
ICWE'05 Proceedings of the 5th international conference on Web Engineering
A web services method on embedded systems
ICWE'05 Proceedings of the 5th international conference on Web Engineering
Hi-index | 0.00 |
A review of the methodological aspects of the EC transactions use different Web-based platforms is presented. Our design techniques for complex EC environments are present to avoid the viruses infected EC transaction files. When an executive service code is ordered it may get infected with some viruses before the signature is attached to it. The infected EC transaction files cannot be detected by signature verification and the origin of the infection order cannot be specified by different Web-based platforms. Applied our EC transactions use different Web-based platforms, these techniques lead to an EC framework with clients, agents, EC application servers and EC system management. The paper discusses how Web-based platforms can use signature method together with detection infected in the preprocessing step enable us to specify the origin of the infection side. The impact of our proposed method can improve Web-based platforms relationships between EC transaction agents.