2005
DOI: 10.1016/j.csi.2004.07.004
|View full text |Cite
|
Sign up to set email alerts
|

A secure on-line software transaction scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…Another line of research into financial transaction and Internet fraud has involved detailed analysis of the computer science and IT technology in areas such as network construction, Internet protocols and data security (Tzenga et al, 2005;Onyszko, 2006). Furthermore, advanced algorisms and encryption models are raised by IT experts to assure that e-transaction/payment is secured (Lin and Hsu, 2011;Vincent et al, 2010).…”
Section: Conceptual Backgroundmentioning
confidence: 99%
“…Another line of research into financial transaction and Internet fraud has involved detailed analysis of the computer science and IT technology in areas such as network construction, Internet protocols and data security (Tzenga et al, 2005;Onyszko, 2006). Furthermore, advanced algorisms and encryption models are raised by IT experts to assure that e-transaction/payment is secured (Lin and Hsu, 2011;Vincent et al, 2010).…”
Section: Conceptual Backgroundmentioning
confidence: 99%