Now a days majority of commerce is taken place in electronic form. The e commerce transactions can be happened mainly in three forms. They are C2C(customer to customer), B2B(Business to business) and B2C(business to customer). Out of these B2C type of e-commerce is the most important one. Therefore there is a need of a secure protocol for performing B2C type of e-commerce transactions. The B2C type the main participating entities are customers, website and merchant. In this paper the communication between the website and merchant is represented by WM protocol. The design of WM protocol must consider several issues like problem definition, services, environment, vocabulary and message formats. The verification of WM protocol is also perform...
The huge development of internet technologies and the widespread of modern and advanced devices lead...
Fair exchange and anonymity are important requirements of e-commerce protocols. We have formally ana...
In this work, we build a general and adaptive transaction model, and based on this model, reliable t...
This paper presents a survey of the practical application of protocol verification techniques to app...
Security protocols in e-commerce are required to manage the transactions between buyers and sellers....
Model checking is an evolving technology for effective and efficient evaluation of e-business protoc...
Electronic commerce is a large and ever growing industry. Online transactions are returning ever-gro...
Among the plethora of solutions to the Business-to-Business interoperability problem, no other solut...
Electronic commerce can be defined as the conduct of commerce in goods and services, with the assist...
Web services providing E-commerce capabilities to support business transactions over the Internet ar...
doi: 10.4156/ijact.vol2.issue2.7 This paper deals with redesigning the existing e-commerce architect...
Abstract — Given its special nature, e-commerce yields concerns for providing secure transactions. A...
Business-to-Business (B2B) e-business is undeniably becoming increasingly important for organization...
We present a cryptographic protocol for securing electronic commerce over the Internet. The protocol...
Commerce is the exchange of goods, services and financial instruments conducted by procedures which ...
The huge development of internet technologies and the widespread of modern and advanced devices lead...
Fair exchange and anonymity are important requirements of e-commerce protocols. We have formally ana...
In this work, we build a general and adaptive transaction model, and based on this model, reliable t...
This paper presents a survey of the practical application of protocol verification techniques to app...
Security protocols in e-commerce are required to manage the transactions between buyers and sellers....
Model checking is an evolving technology for effective and efficient evaluation of e-business protoc...
Electronic commerce is a large and ever growing industry. Online transactions are returning ever-gro...
Among the plethora of solutions to the Business-to-Business interoperability problem, no other solut...
Electronic commerce can be defined as the conduct of commerce in goods and services, with the assist...
Web services providing E-commerce capabilities to support business transactions over the Internet ar...
doi: 10.4156/ijact.vol2.issue2.7 This paper deals with redesigning the existing e-commerce architect...
Abstract — Given its special nature, e-commerce yields concerns for providing secure transactions. A...
Business-to-Business (B2B) e-business is undeniably becoming increasingly important for organization...
We present a cryptographic protocol for securing electronic commerce over the Internet. The protocol...
Commerce is the exchange of goods, services and financial instruments conducted by procedures which ...
The huge development of internet technologies and the widespread of modern and advanced devices lead...
Fair exchange and anonymity are important requirements of e-commerce protocols. We have formally ana...
In this work, we build a general and adaptive transaction model, and based on this model, reliable t...