Advertisements
Advertisements
Question
List the different types of security technologies in E-Commerce.
Short/Brief Note
Advertisements
Solution
- Encryption technology
- Authentication technology
- Authentication protocols
shaalaa.com
Security Technologies in E-commerce Transaction
Is there an error in this question or solution?
APPEARS IN
RELATED QUESTIONS
Asymmetric encryption is also called as ______.
PGP stands for ______.
_____ protocol is used for securing credit cards transactions via the internet.
Secure Electronic Transaction (SET) was developed in ______.
The websites secured by Secure Socket Layer protocols can be identified using ______.
3-D Secure, a protocol was developed by ______.
Write a note on certification authorities (CA).
Differentiate asymmetric and symmetric algorithms.
Write a note on PGP.
Differenticate digital signatures and digital certificates.
