Abstract
The security problems in electronic commerce in transactions are very evident in public companies. The objective of this research is to analyze security algorithms and protocols to mitigate risks and vulnerabilities within commercial transactions that help us identify computer attacks, whether internal or external. Deductive method and exploratory research were used to analyze the information from the reference articles and information available online; regarding different types of protocols and algorithms that protect the information in its entirety and confidentiality, thus providing the respective security to the information of public companies. It resulted in a control of the security and privacy factors, by having RSA algorithms with formulas to encrypt and decrypt public keys, combinations of commercial transactions, asymmetric and symmetric cryptography and the SET protocol, which facilitates the algorithms in decision-making within the organizations. It was concluded that the SET protocol is the best in facilitating greater security to mitigate vulnerabilities, threats and risks of its processes in public organizations.
Original language | English |
---|---|
Title of host publication | 2020 Asia Conference on Computers and Communications, ACCC 2020 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 96-103 |
Number of pages | 8 |
ISBN (Electronic) | 9781728189673 |
DOIs | |
State | Published - 18 Sep 2020 |
Event | 2020 Asia Conference on Computers and Communications, ACCC 2020 - Singapore, Singapore Duration: 18 Sep 2020 → 20 Sep 2020 |
Publication series
Name | 2020 Asia Conference on Computers and Communications, ACCC 2020 |
---|
Conference
Conference | 2020 Asia Conference on Computers and Communications, ACCC 2020 |
---|---|
Country/Territory | Singapore |
City | Singapore |
Period | 18/09/20 → 20/09/20 |
Bibliographical note
Publisher Copyright:© 2020 IEEE.
Keywords
- Algorithm
- Protocol security
- Risks
- Security information
- Vulnerabilities