Secure Multi-Party E-Commerce Protocols

Secure Multi-Party E-Commerce Protocols
Author: Cătălin V. Bîrjoveanu
Publisher: Springer Nature
Total Pages: 109
Release: 2022-06-30
Genre: Computers
ISBN: 3030993515

This book presents the state of the art for multi-party fair exchange protocols and provides insight details regarding multi-party applications for buying physical products. The authors tackle the fairness problem in e-commerce protocols for buying physical products in scenarios involving complex and chained transactions and provide use cases of these protocols for B2C and B2B scenarios. The book also includes the formal verification of the fair multi-party exchange e-commerce protocols using the Constraint-Logic-based Attack Searcher from AVISPA, a tool for the Automated Validation of Internet Security Protocols and Applications. This book is mainly targeted to researchers in e-commerce security, yet it shall be interesting as well for professional developers in e-commerce. They all are provided with an understanding of and a starting point for designing secure multi-party e-commerce protocols.

Secure Multi-Party Non-Repudiation Protocols and Applications

Secure Multi-Party Non-Repudiation Protocols and Applications
Author: José A. Onieva
Publisher: Springer Science & Business Media
Total Pages: 193
Release: 2008-10-31
Genre: Computers
ISBN: 0387756302

The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. This book is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. The book is also suitable as an advanced-level text or reference book for students in computer science.

A Pragmatic Introduction to Secure Multi-Party Computation

A Pragmatic Introduction to Secure Multi-Party Computation
Author: David Evans
Publisher: Foundations and Trends (R) in Privacy and Security
Total Pages: 190
Release: 2018-12-19
Genre:
ISBN: 9781680835083

Practitioners and researchers seeking a concise, accessible introduction to secure multi-party computation which quickly enables them to build practical systems or conduct further research will find this essential reading.

Protocols for Secure Electronic Commerce

Protocols for Secure Electronic Commerce
Author: Mostafa Hashem Sherif
Publisher: CRC Press
Total Pages: 640
Release: 2003-11-24
Genre: Computers
ISBN: 1420040014

The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes. Protocols for Secure Electronic Commerce, Second Edition addresses the security portion of this challenge. It is a full compendium of the protocols for securing online commerce and payments, serving as an invaluable resource for students and professionals in the fields of computer science and engineering, IT security, and financial and banking technology. The initial sections provide a broad overview of electronic commerce, money, payment systems, and business-to-business commerce, followed by an examination of well-known protocols (SSL, TLS, WTLS, and SET). The book also explores encryption algorithms and methods, EDI, micropayment, and multiple aspects of digital money. Like its predecessor, this edition is a general analysis that provides many references to more technical resources. It delivers extensive revisions of previous chapters, along with new chapters on electronic commerce in society, new e-commerce systems, and the security of integrated circuit cards.

Cryptographic Protocol

Cryptographic Protocol
Author: Ling Dong
Publisher: Springer Science & Business Media
Total Pages: 379
Release: 2012-06-20
Genre: Computers
ISBN: 3642240739

"Cryptographic Protocol: Security Analysis Based on Trusted Freshness" mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the trusted freshness component. A novel freshness principle based on the trusted freshness component is presented; this principle is the basis for an efficient and easy method for analyzing the security of cryptographic protocols. The reasoning results of the new approach, when compared with the security conditions, can either establish the correctness of a cryptographic protocol when the protocol is in fact correct, or identify the absence of the security properties, which leads the structure to construct attacks directly. Furthermore, based on the freshness principle, a belief multiset formalism is presented. This formalism’s efficiency, rigorousness, and the possibility of its automation are also presented. The book is intended for researchers, engineers, and graduate students in the fields of communication, computer science and cryptography, and will be especially useful for engineers who need to analyze cryptographic protocols in the real world. Dr. Ling Dong is a senior engineer in the network construction and information security field. Dr. Kefei Chen is a Professor at the Department of Computer Science and Engineering, Shanghai Jiao Tong University.

E-Commerce Security and Privacy

E-Commerce Security and Privacy
Author: Anup K. Ghosh
Publisher: Springer Science & Business Media
Total Pages: 176
Release: 2012-12-06
Genre: Computers
ISBN: 1461514673

Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY. The goals of this series are, one, to establish the state of the art of and set the course for future research in information security and, two, to serve as a central reference and timely topics in information security research source for advanced and development. The scope of this series includes all aspects of com puter and network security and related areas such as fault tolerance and software assurance. ADVANCES IN INFORMATION SECURITY aims to publish thor ough and cohesive overviews of specific topics in information security, as well as works that are larger in scope or that contain more detailed background information than can be accommodated in shorter survey articles. The series also serves as a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook treat ment. The success of this series depends on contributions by researchers and developers such as yourself. If you have an idea for a book that is appro priate for this series, I encourage you to contact either the Acquisitions Editor for the series, Lance Wobus ([email protected]), or myself, the Consulting Editor for the series ([email protected]). We would be happy about to discuss any potential projects with you. Additional information this series can be obtained from www.wkap.nljseries.htmjADIS.

Applications of Secure Multiparty Computation

Applications of Secure Multiparty Computation
Author: P. Laud
Publisher: IOS Press
Total Pages: 264
Release: 2015-07-30
Genre: Computers
ISBN: 161499532X

We generate and gather a lot of data about ourselves and others, some of it highly confidential. The collection, storage and use of this data is strictly regulated by laws, but restricting the use of data often limits the benefits which could be obtained from its analysis. Secure multi-party computation (SMC), a cryptographic technology, makes it possible to execute specific programs on confidential data while ensuring that no other sensitive information from the data is leaked. SMC has been the subject of academic study for more than 30 years, but first attempts to use it for actual computations in the early 2000s – although theoretically efficient – were initially not practicable. However, improvements in the situation have made possible the secure solving of even relatively large computational tasks. This book describes how many different computational tasks can be solved securely, yet efficiently. It describes how protocols can be combined to larger applications, and how the security-efficiency trade-offs of different components of an SMC application should be chosen. Many of the results described in this book were achieved as part of the project Usable and Efficient Secure Multi-party Computation (UaESMC), which was funded by the European Commission. The book will be of interest to all those whose work involves the secure analysis of confidential data.

Secure Multi-party Computation

Secure Multi-party Computation
Author: Manoj Prabhakaran
Publisher: IOS Press
Total Pages: 296
Release: 2013
Genre: Computers
ISBN: 1614991685

Secure Multi-Party Computation MPC is one of the most powerful tools developed by modern cryptography it facilitates collaboration among mutually distrusting parties by implementing a virtual trusted party. Despite the remarkable potential of such a tool, and decades of active research in the theoretical cryptography community, it remains a relatively inaccessible and lesser-known concept outside of this field. Only a handful of resources are available to students and researchers wishing to learn more about MPC. The editors of this book have assembled a comprehensive body of basic and advanced material on MPC, authored by

Information Security Practice and Experience

Information Security Practice and Experience
Author: Xinyi Huang
Publisher: Springer
Total Pages: 591
Release: 2014-04-28
Genre: Computers
ISBN: 3319063200

This book constitutes the proceedings of the 10th International Conference on Information Security Practice and Experience, ISPEC 2014, held in Fuzhou, China, in May 2014. The 36 papers presented in this volume were carefully reviewed and selected from 158 submissions. In addition the book contains 5 invited papers. The regular papers are organized in topical sections named: network security; system security; security practice; security protocols; cloud security; digital signature; encryption and key agreement and theory.

E-Business and Telecommunications

E-Business and Telecommunications
Author: Mohammad S. Obaidat
Publisher: Springer Nature
Total Pages: 235
Release: 2019-11-12
Genre: Computers
ISBN: 3030348660

This book constitutes the refereed proceedings of the 15th International Joint Conference on E-Business and Telecommunications, ICETE 2018, held in Porto, Portugal, in July 2018. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Signal Processing and Multimedia, SIGMAP; International Conference on Wireless Information Systems, WINSYS. The 11 full papers presented in the volume were carefully reviewed and selected from the 201 submissions. The papers cover the following key areas of information and communication technologies: data communication networking, e-business, optical communication systems, security and cryptography, signal processing and multimedia applications, and wireless networks and mobile systems.