000 03388nam a22006015i 4500
001 978-3-030-99351-1
003 DE-He213
005 20240423125337.0
007 cr nn 008mamaa
008 220630s2022 sz | s |||| 0|eng d
020 _a9783030993511
_9978-3-030-99351-1
024 7 _a10.1007/978-3-030-99351-1
_2doi
050 4 _aHF5548.32-.33
072 7 _aUF
_2bicssc
072 7 _aKJE
_2bicssc
072 7 _aCOM064000
_2bisacsh
072 7 _aUXJ
_2thema
072 7 _aKJE
_2thema
082 0 4 _a381.142
_223
100 1 _aBîrjoveanu, Cătălin V.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aSecure Multi-Party E-Commerce Protocols
_h[electronic resource] /
_cby Cătălin V. Bîrjoveanu, Mirela Bîrjoveanu.
250 _a1st ed. 2022.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2022.
300 _aX, 109 p. 15 illus., 5 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Computer Science,
_x2191-5776
505 0 _a1. Introduction -- 2. Two-Party E-Commerce Protocols -- 3. Multi-Party E-Commerce Protocols for Complex Transactions -- 4. E-Commerce Protocols for Multi-Chained Complex Transactions -- 5. Formal Verification of Multi-Party Fair Exchange E-Commerce Protocols -- 6. Conclusions.
520 _aThis book presents the state of the art for multi-party fair exchange protocols and provides insight details regarding multi-party applications for buying physical products. The authors tackle the fairness problem in e-commerce protocols for buying physical products in scenarios involving complex and chained transactions and provide use cases of these protocols for B2C and B2B scenarios. The book also includes the formal verification of the fair multi-party exchange e-commerce protocols using the Constraint-Logic-based Attack Searcher from AVISPA, a tool for the Automated Validation of Internet Security Protocols and Applications. This book is mainly targeted to researchers in e-commerce security, yet it shall be interesting as well for professional developers in e-commerce. They all are provided with an understanding of and a starting point for designing secure multi-party e-commerce protocols.
650 0 _aElectronic commerce.
650 0 _aData protection.
650 0 _aInformation technology
_xManagement.
650 0 _aApplication software.
650 1 4 _ae-Commerce and e-Business.
650 2 4 _aData and Information Security.
650 2 4 _aComputer Application in Administrative Data Processing.
650 2 4 _aComputer and Information Systems Applications.
650 2 4 _aSecurity Services.
700 1 _aBîrjoveanu, Mirela.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030993504
776 0 8 _iPrinted edition:
_z9783030993528
830 0 _aSpringerBriefs in Computer Science,
_x2191-5776
856 4 0 _uhttps://doi.org/10.1007/978-3-030-99351-1
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c176929
_d176929