E-commerce is a growing technology in today's business and trade. It has
become a quick and easy medium of trading, facilitating buying and selling
for both the consumers and the merchants. With just a few keystrokes and
entry of one's information, business transactions are easily carried out.
In view of this, because e-commerce utilizes the Internet, it is very
important that e-commerce applications should provide protection to
business transactions' critical information, both of the consumer's and the
Authentication is among the many forms of protecting information and
securing transactions in e-commerce. With the use of authentication tools,
information sent online can be validated. The growing number of Internet
users makes classified information more and more volatile from online
hackers. Thus, it is essential for e-commerce applications to apply
several authentication processes. According to Charles Kolodgy, in Michael
"â€individuals on the Web are not authenticated, it is relatively easy
to impersonate somebody online"
Authentication is basically a form of verifying the true identity of an
individual. An instance of an authentication process is that a consumer
may be required to key several information about himself or herself before
an e-commerce transaction begins. Matthew D. Ford, in his Identity
Authentication and E-commerce, listed the following methods to authenticate
1. Something the claimant knows
4. Claimant is at a particular place (at a particular time)
5. Authentication is established by a trusted third party
Despite of the many threats, such as hacking and communication
interceptions, to the confidentiality of information across Internet, e-
commerce is still a living technology nowadays. This is in account of the
...