Protocols for Secure Electronic Commerce 2nd Edition by Mostafa Hashem Sherif – Ebook PDF Instant Download/Delivery: 1420040014, 9781420040012
Full download Protocols for Secure Electronic Commerce 2nd Edition after payment

Product details:
ISBN 10: 1420040014
ISBN 13: 9781420040012
Author: Mostafa Hashem Sherif
Protocols for Secure Electronic Commerce 2nd Table of contents:
Chapter 1 – Overview of Electronic Commerce
-
What Is Electronic Commerce?
-
Categories of Electronic Commerce
-
The Influence of the Internet
-
Infrastructure for Electronic Commerce
-
Network Access
-
Consequences of E‑commerce
Chapter 2 – Money and Payment Systems
-
The Mechanisms of Classical Money
-
Instruments of Payment
-
Types of Dematerialized Monies
-
Purses and Holders
-
Transactional Properties of Dematerialized Currencies
-
Overall Comparison of the Means of Payment
-
The Practice of Dematerialized Money
-
Banking Clearance and Settlement
Chapter 3 – Algorithms and Architectures for Security
-
Security of Open Financial Networks
-
OSI Model for Cryptographic Security
-
Security Services at the Link, Network, and Application Layers
-
Message Confidentiality
-
Data Integrity
-
Identification and Authentication of Participants
-
Access Control
-
Denial of Service
-
Nonrepudiation
-
Secure Management of Cryptographic Keys
-
Exchange of Secret Keys: Kerberos & Public Key Kerberos
-
Exchange of Public Keys & Certificate Management
-
Encryption Cracks
Chapter 4 – Business‑to‑Business Commerce
-
Overview and Examples
-
EDI Messaging, Security, and Integration
-
Structured Data and Documents
-
Electronic Billing & Financial Transactions
-
Standardization of B2B Exchanges
Chapter 5 – SSL (Secure Sockets Layer)
-
SSL Protocol Overview
-
SSL Subprotocols
-
Example of SSL Handshake
-
Performance and Implementations
Chapter 6 – TLS (Transport Layer Security) and WTLS (Wireless TLS)
-
Evolution from SSL
-
WTLS Design and Usage
Chapter 7 – The SET Protocol
-
SET Architecture & Security Services
-
Certification
-
Purchasing Transaction Process
-
Optional Procedures & Implementations
Chapter 8 – Composite Solutions
-
C‑SET and Cyber‑COMM
-
Hybrid SSL/SET Architecture
-
3‑D Secure
Chapter 9 – Micropayments and Face‑to‑Face Commerce
-
Characteristics & Applications
-
Systems: Chipper, GeldKarte, Mondex, Proton, etc.
Chapter 10 – Remote Micropayments
-
NetBill, KLELine, Millicent, PayWord, MicroMint, eCoin
Chapter 11 – Digital Money
-
Virtual Money Platforms like DigiCash, NetCash, e‑Check systems
Chapter 12 – Dematerialized Checks
-
NetCheque, BIPS, eCheck – comparison with bankcards
Chapter 13 – Security of Integrated Circuit Cards
-
IC Card Descriptions, Standards & Multi‑application
-
Security Aspects of Smart Cards
Chapter 14 – Systems of Electronic Commerce
-
Systems Like SEMPER, CAFE, JEPI
-
PICS/P3P, Web Services, XML/EDIFACT
Chapter 15 – Electronic Commerce in Society
-
Infrastructure, Standardization, Intellectual Property
-
Privacy, Surveillance, Censorship, Taxation, Fraud Prevention
-
Archival, Web Standards, Biometrics
People also search for Protocols for Secure Electronic Commerce 2nd:
secure e-commercial protocol
secure electronic commerce transaction
protocols of e commerce
a standard protocol for securing credit card
which security protocols are predominantly used in web-based e-commerce


