International Research Journal of Commerce , Arts and Science

 ( Online- ISSN 2319 - 9202 )     New DOI : 10.32804/CASIRJ

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 29    Submit Your Rating     Cite This   Download        Certificate

SECURE ELECTRONIC TRANSACTIONS (SET): A CASE OF SECURE

    1 Author(s):  DR. N.KJOSHI . MS. TANVU SHARMA

Vol -  7, Issue- 6 ,         Page(s) : 29 - 33  (2016 ) DOI : https://doi.org/10.32804/CASIRJ

Abstract

Secure Electronic Transactions (SET) is a security protocol for an SET is using PKT for security e-commerce. This paper studies how SET was rejected by e-commerce end-users. PKI issues associated with SET implementation in B2C e-commerce are also reviewed.

1. A. Bhatnager, S. Misra, and H. R. Rao, “On risk, convenience, and internet shopping behaviour,” Communications of the ACM, vol. 43, pp. 98-106, November 2000. 

2. K.  Caldwell,  “Global  electronic  commerce-moving  forward,” 
3. Commerce Net: The Public Policy Report, vol. 2, pp. 2-17, December 2000. 
4. V. Farrell, Y. Leung, and G. Farrell, “A study on consumer fears and trust in internet based electronic commerce,” in Proceedings of 13th International Bled Electronic Commerce Conference, pp. 647-658, June 2000. 

5. M. Friedman, P. H. Kahn, and D. C. Howe, “Trust online,” Communications of the ACM, vol. 43, pp. 34-40, December 2000. 
6. S. Giff, “The influence of metaphor, smart cards, and interface dialogue on trust in ecommerce,” MSc project, University College London, 2000. 
7. C. Adams and S. Lloyd, Understanding Public-Key Infrastructure: concepts, standards, and deployment considerations, New Riders, Indianapolis: Macmillan, 1999. 

8. S. Farrell and M. Zolotarev, “XML and PKI-what’s the story?” Network Security, vol. 2001, pp. 7-10, September 2001. 
9. F. Piper, “Some trends in research in cryptography and security mechanisms,” Computers and Security, vol. 22, pp. 22-25, January 2003. 

10. A. J. Menezes, P. C. V. Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, 1996. 
11. C. J. Mitchell, “PKI standards,” Information Security Technical Report, vol. 5, pp. 17-32, November 2000. 
12. E. Rescorla, SSL and TLS: Designing and Building Secure Systems, Addison-Wesley, 2001. 
13. L. Loeb, Secure Electronic Transactions: Introduction and Technical Reference, Boston: Artech House, 1998. 
14. M. S. Merkow, J. Breithaupt, and K. L. Wheeler, Building SET Applications for Secure Transactions, John Wiley and Sons, New York, 1998. 

15. Secure Electronic Transaction LLC (SETCo), SET Secure Electronic Transaction Specification, version 1.0 ed., May 1997. 
16. K. Chen, H. Lee, and B. Mayer, “The impact of security control on business-to-consumer electronic commerce,” Human Systems Management, vol. 20, no. 2, pp. 139,147, 2001. 

17. Q. Chen, C. Zhang, and S. Zhang, “Overview of security protocol anal-ysis,” in Secure Transaction Protocol Analysis Models and Applications, Lecture Notes in Computer Science, Springer-Verlag, Berlin, vol. 5111, pp. 17-72, 2008. 

18. V. C. Storey, D. W. Straub, K. A. Stewart, and R. J. Welke, “A conceptual investigation of the e-commerce industry,” Communications of the ACM, vol. 43, pp. 117-123, July 2000. 

19. R. Oppliger, Security Technologies for the World Wide Web. Artech House, Massachusetts, 2000. 
20. N. Asokan and A. Phillipe, “The state of the art in electronic payment systems,” IEEE Computer, vol. 30, pp. 28-35, 1997. 
21. D. Birch, “Secure electronic commerce – i: The certificate business public key infrastructure will be big business,” Computer Law & Security Review, vol. 13, no. 6, pp. 454-456, 1997. 

22. Secure Electronic Transaction LLC (SETCo), SET Secure Electronic Transaction Specification, version 1.0 ed., May 1997. 
23. J. D. Tygar, “Atomicity in electronic commerce,” Net Worker, vol. 2, pp. 32-43, May 1998. 
24. E. Bellis, Beautiful Security, ch. Beautiful Trade: Rethinking E-Commerce Security, Sebastopol: O’Reilly, 2009. 
25. G. W. Treese and L. C. Stewart, Designing Systems for Internet Commerce, Massachusetts: Addison-Wesley, 1998. 
26. L. D. Stein, Web Security, Addison-Wesley, Massachusetts, 1998. 
27. J. Lieb, “Getting secure online-an overview,” Commerce Net-The Strategies Report, vol. 1, pp. 1-4, July 1999. 
28. Ford and M. S. Baum, Secure Electronic Commerce, Prentice Hall, 2001. 
29. Secure Electronic Transaction LLC (SETCo), Common Chip Extension -Application for SETCo Approval, version 1.0 ed., September 1999. 
30. Secure Electronic Transaction LLC (SETCo), Online PIN Extensions to SET Secure Electronic Transaction, version 1.0 ed., May 1999. 
31. P. Jarupunphol and C. J. Mitchell, “Measuring SSL and SET against e-commerce consumer requirements,” in Proceedings of the International Network Conference (INC 2002), Plymouth University Press, pp. 323-330, July 2002. 
32. P. Jarupunphol and C. J. Mitchell, “The future of SET,” in Proceedings of UKAIS 2002, Leeds Metropolitan University, pp. 9-17, April 2002. 
33. D. Whinnett, “End user acceptance of security technology for electronic commerce,” in Proceedings of 4th International Conference on IS&N(A. P. Mullery, M. Besson, M. Campolargo, R. Gobbi, and R. Reed, eds.), Lecture Notes in Computer Science, Springer-Verlag, Berlin, vol. 1238, pp. 447-457, 1997. 

34. IBM e-business, Internet Wallet Choices and Answers for Business and Technical Managers, 1999. 
35. P. Jarupunphol, “A critical analysis of 3-D Secure,” in Proceedings of the 3rd Electronic Commerce Research and Development (E-COM-03), Gdansk, Poland, pp. 87-94, October 2003. 

36. P. Jarupunphol and C. J. Mitchell, “Implementation aspects of SET/EMV,” in Towards the Knowledge Society: eCommerce, eBusiness and eGovernment, The 2nd IFIP Conference on e-commerce, e-business and e-government, IFIP I3E 2002 (J. L. Monteiro, P. M. Swatman, and L. V. Tavares, eds.), pp. 305-315, Kluwer Academic Publishers (IFIP Conference Proceedings 233), Boston (2002), October 2002. 

37. K. Wrona, M. Schuba, and G. Zavagli, “Mobile payment- state of the art and open problems,” in Proceedings of 2nd International Workshop
38. IACSIT International Journal of Engineering and Technology, Vol. 5, No. 2, April 2013

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details