2016
DOI: 10.1016/j.procs.2016.05.549
|View full text |Cite
|
Sign up to set email alerts
|

E-commerce Security through Elliptic Curve Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 1 publication
0
10
0
Order By: Relevance
“…We have to compute EC, embedding rate (ER) in bpp, PSNR and SSIM for the images Airplane, Baboon, Barbara, Lenna, Boat and Peppers. In the table 3, shows the comparison between proposed work and the recent work by J Hoeng [27], Zhang et.al [38] and Geeta et.al [31] in terms of EC, ER, PSNR and SSIM. The maximum possible rate and PSNR in [27] is 0.73 and 33.15, 0.78 and 34.28 in [38] & 0.83 and 32.18 in [31] for airplane image.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…We have to compute EC, embedding rate (ER) in bpp, PSNR and SSIM for the images Airplane, Baboon, Barbara, Lenna, Boat and Peppers. In the table 3, shows the comparison between proposed work and the recent work by J Hoeng [27], Zhang et.al [38] and Geeta et.al [31] in terms of EC, ER, PSNR and SSIM. The maximum possible rate and PSNR in [27] is 0.73 and 33.15, 0.78 and 34.28 in [38] & 0.83 and 32.18 in [31] for airplane image.…”
Section: Resultsmentioning
confidence: 99%
“…In the table 3, shows the comparison between proposed work and the recent work by J Hoeng [27], Zhang et.al [38] and Geeta et.al [31] in terms of EC, ER, PSNR and SSIM. The maximum possible rate and PSNR in [27] is 0.73 and 33.15, 0.78 and 34.28 in [38] & 0.83 and 32.18 in [31] for airplane image. The obtained SSIM is 0.9821 in [27],0.9356 in [38] & 0.9551 in [31].…”
Section: Resultsmentioning
confidence: 99%
“…Also, there is no confirmation that the client or organization is who it claims to be. Which is alluded to as the authentication problem [26], [27]. In addition, in an e-commerce agreement, one of the parties may dispute being an actor.…”
Section: Securitymentioning
confidence: 99%
“…They used ECC algorithm which is most protected and less time engrossing. With the help of private and public key of sender and receiver, it can control all the encryption and the decryption [6], [10]. Christina Thomas et al discussed the security issues and drawbacks in the existing encryption techniques.…”
Section: Literature Surveymentioning
confidence: 99%