E-Commerce security protocol usually adopts SSL and SET protocol.
电子商务中的安全协议主要采用SSL协议和SET协议。
The most common e-commerce security of SSL and SET mechanism is two.
电子商务最常见之平安机制有ssl及SET两种。
E-Commerce security protocols based on XML are discussed in the paper.
本文主要对基于XML的电子商务安全协议进行了研究。
This simple activity illustrates the four major players in e-Commerce security.
这个最简单的活动说明了e - Commerce安全中最主要的4个参与者。
What can China learn from other countries when it comes to enhancing e-commerce security?
有什么可以借鉴其他国家的中国,当谈到加强电子商务的安全性?
The paper discusses and analyses Cryptography technology and its application in e-commerce security.
论述和分析了加密技术及其在电子商务安全方面的应用现状。
At last, according to the content, the article analysis and designs a set of realization scheme for E-commerce security system.
最后,笔者根据这些内容,分析设计一套电子商务安全系统的实现方案。
The main thesis completed the following work: 1. Fingerprint technology and e-commerce security certification of the theoretical analysis.
本论文主要完成了以下工作:(1)指纹技术与电子商务安全认证的理论分析。
E-commerce security protocol is not only an important way to protect the security of e-commerce, but also the core technology of thee-commerce.
电子商务安全协议是保障电子商务安全性的重要途径,也是电子商务中最核心最关键的技术。
The importance of e-commerce security protocol is self-evident as a key factor to ensure the information and data security, and to safeguard the vital interests of both sides.
电子商务安全协议作为切实保证交易双方信息数据安全,维护双方切身利益的关键因素,其重要性不言而喻。
It has been proven by instances that the extended model and method can better analyze and describe the security of e-commerce security protocol, and be applied in wider fields.
实例证明了扩展后的模型和方法能够更精确地分析和描述电子商务安全协议的安全性,并能够应用于更广泛的领域。
In this paper, the authors present a new SAML-based security information exchange service and a cooperative e-Commerce security service system for enterprise application integration.
针对该问题,给出了一种基于SAML的安全数据交换服务和基于该服务的面向企业应用协作的协同电子商务安全服务系统。
For example, any part of your application that deals with e-commerce, banking, or finances requires the heaviest data security and encryption you can get your hands on.
例如,处理电子商务、银行交易或金融的任何应用程序部分都需要所能提供的最高级别的安全性和加密。
In this article, we focus on possible attack scenarios in an e-Commerce system and provide preventive strategies, including security features, that you can implement.
在本文中,我们关注e - Commerce系统中可能出现的袭击场景以及您可以实施的预防策略,包括安全特性。
This article outlined the key players and security attacks and defenses in an e-Commerce system.
本文概述了e - Commerce系统中的关键参与者,安全性攻击和防御。
This paper introduces the basic concepts of SET, the primary technologies involved and the running procedure, at the same time it analyses how SET implement the security of e - commerce.
这里详细介绍了SET的基本概念、所使用的主要技术以及运行的过程,同时分析了SET是怎样解决网上交易安全性的。
P2P Electronic Commerce greatly enhances the conveniency and flexibility of e-business, on the other hand that aggravates the risk and security threatening of business activity.
P2P电子商务比传统电子商务更方便、更灵活,但用户所涉及的风险和安全威胁也越大,各种网络诈骗层出不穷。
Furthermore, e-commerce using check and credit cards leaves the clients vulnerable to banking fraud which remains the top security concerns for people when it comes to online shopping.
此外,电子商务所需用的信用卡很容易对客户实施银行诈骗,这就意味着,当人们网购时,人们的安全受到威胁。
As a new business model, information security, security is a prerequisite for the implementation of e-commerce.
而作为一种全新的商务模式,信息安全的保障是电子商务实施的前提。
The security is the primary concern to the network system of E commerce.
安全性是电子商务网络系统的首要问题。
This paper describes the mathematics base of algebraic geometry and ECC. It also discusses the elliptic curve discrete logarithm problem (ECDLP) and the security applications of ECC on E-commerce.
该文描述了代数几何与ecc的数学基础及椭圆曲线离散对数问题困难性,讨论了ECC在电子商务中的安全应用。
From data of accountant to information system of accountant, the paper builds the security control system of corporation accountant in the circumstance of E-commerce.
本文从点(会计数据)到面(会计信息系统)构建了电子商务环境下企业会计的安全控制体系。
We analyse the security of e-commerce protocols in failure environments using the model checking approach.
本文用模型检测的方法分析了不可靠环境下电子商务协议的安全性质。
Therefore it is necessary to understand the network threats toe-commerce, and adopt the corresponding security policy to guarantee e-commerce run normally continuously, stably and correctly.
因此必须了解电子商务所受到的网络威胁,并采取相应的安全策略来保证电子商务系统的正常、连续、稳定、正确地运行。
In the light of the economic security and risks existing in e-commerce, the industrial safety checklist can be used in thee-commerce for estimating the security of e-commerce platform.
针对电子商务中存在的经济安全和风险,可将工业安全检查表法应用于电子商务中以评价电子商务平台的安全性。
Under this tide, traditional security ways have been no longer reliable to satisfy the need of complex behaviors of e-commerce and information security.
在此潮流之下,传统的保密与认证方式,已难以应付日益复杂的电子交易和信息保密措施的需要。
Under this tide, traditional security ways have been no longer reliable to satisfy the need of complex behaviors of e-commerce and information security.
在此潮流之下,传统的保密与认证方式,已难以应付日益复杂的电子交易和信息保密措施的需要。
应用推荐