000 | 03388nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-3-030-99351-1 | ||
003 | DE-He213 | ||
005 | 20240423125337.0 | ||
007 | cr nn 008mamaa | ||
008 | 220630s2022 sz | s |||| 0|eng d | ||
020 |
_a9783030993511 _9978-3-030-99351-1 |
||
024 | 7 |
_a10.1007/978-3-030-99351-1 _2doi |
|
050 | 4 | _aHF5548.32-.33 | |
072 | 7 |
_aUF _2bicssc |
|
072 | 7 |
_aKJE _2bicssc |
|
072 | 7 |
_aCOM064000 _2bisacsh |
|
072 | 7 |
_aUXJ _2thema |
|
072 | 7 |
_aKJE _2thema |
|
082 | 0 | 4 |
_a381.142 _223 |
100 | 1 |
_aBîrjoveanu, Cătălin V. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aSecure Multi-Party E-Commerce Protocols _h[electronic resource] / _cby Cătălin V. Bîrjoveanu, Mirela Bîrjoveanu. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 |
_aX, 109 p. 15 illus., 5 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs in Computer Science, _x2191-5776 |
|
505 | 0 | _a1. Introduction -- 2. Two-Party E-Commerce Protocols -- 3. Multi-Party E-Commerce Protocols for Complex Transactions -- 4. E-Commerce Protocols for Multi-Chained Complex Transactions -- 5. Formal Verification of Multi-Party Fair Exchange E-Commerce Protocols -- 6. Conclusions. | |
520 | _aThis book presents the state of the art for multi-party fair exchange protocols and provides insight details regarding multi-party applications for buying physical products. The authors tackle the fairness problem in e-commerce protocols for buying physical products in scenarios involving complex and chained transactions and provide use cases of these protocols for B2C and B2B scenarios. The book also includes the formal verification of the fair multi-party exchange e-commerce protocols using the Constraint-Logic-based Attack Searcher from AVISPA, a tool for the Automated Validation of Internet Security Protocols and Applications. This book is mainly targeted to researchers in e-commerce security, yet it shall be interesting as well for professional developers in e-commerce. They all are provided with an understanding of and a starting point for designing secure multi-party e-commerce protocols. | ||
650 | 0 | _aElectronic commerce. | |
650 | 0 | _aData protection. | |
650 | 0 |
_aInformation technology _xManagement. |
|
650 | 0 | _aApplication software. | |
650 | 1 | 4 | _ae-Commerce and e-Business. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputer Application in Administrative Data Processing. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aSecurity Services. |
700 | 1 |
_aBîrjoveanu, Mirela. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030993504 |
776 | 0 | 8 |
_iPrinted edition: _z9783030993528 |
830 | 0 |
_aSpringerBriefs in Computer Science, _x2191-5776 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-99351-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c176929 _d176929 |