語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Secure multi-party e-commerce protocols
~
Birjoveanu, Catalin V.
FindBook
Google Book
Amazon
博客來
Secure multi-party e-commerce protocols
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Secure multi-party e-commerce protocols/ by Catalin V. Birjoveanu, Mirela Birjoveanu.
作者:
Birjoveanu, Catalin V.
其他作者:
Birjoveanu, Mirela.
出版者:
Cham :Springer International Publishing : : 2022.,
面頁冊數:
x, 109 p. :ill., digital ;24 cm.
內容註:
1. Introduction -- 2. Two-Party E-Commerce Protocols -- 3. Multi-Party E-Commerce Protocols for Complex Transactions -- 4. E-Commerce Protocols for Multi-Chained Complex Transactions -- 5. Formal Verification of Multi-Party Fair Exchange E-Commerce Protocols -- 6. Conclusions.
Contained By:
Springer Nature eBook
標題:
Electronic commerce - Security measures. -
電子資源:
https://doi.org/10.1007/978-3-030-99351-1
ISBN:
9783030993511
Secure multi-party e-commerce protocols
Birjoveanu, Catalin V.
Secure multi-party e-commerce protocols
[electronic resource] /by Catalin V. Birjoveanu, Mirela Birjoveanu. - Cham :Springer International Publishing :2022. - x, 109 p. :ill., digital ;24 cm. - SpringerBriefs in computer science,2191-5776. - SpringerBriefs in computer science..
1. Introduction -- 2. Two-Party E-Commerce Protocols -- 3. Multi-Party E-Commerce Protocols for Complex Transactions -- 4. E-Commerce Protocols for Multi-Chained Complex Transactions -- 5. Formal Verification of Multi-Party Fair Exchange E-Commerce Protocols -- 6. Conclusions.
This book presents the state of the art for multi-party fair exchange protocols and provides insight details regarding multi-party applications for buying physical products. The authors tackle the fairness problem in e-commerce protocols for buying physical products in scenarios involving complex and chained transactions and provide use cases of these protocols for B2C and B2B scenarios. The book also includes the formal verification of the fair multi-party exchange e-commerce protocols using the Constraint-Logic-based Attack Searcher from AVISPA, a tool for the Automated Validation of Internet Security Protocols and Applications. This book is mainly targeted to researchers in e-commerce security, yet it shall be interesting as well for professional developers in e-commerce. They all are provided with an understanding of and a starting point for designing secure multi-party e-commerce protocols.
ISBN: 9783030993511
Standard No.: 10.1007/978-3-030-99351-1doiSubjects--Topical Terms:
590545
Electronic commerce
--Security measures.
LC Class. No.: HF5548.32 / .B2 2022
Dewey Class. No.: 381.142
Secure multi-party e-commerce protocols
LDR
:02336nmm a2200373 a 4500
001
2301829
003
DE-He213
005
20220630081757.0
006
m d
007
cr nn 008maaau
008
230409s2022 sz s 0 eng d
020
$a
9783030993511
$q
(electronic bk.)
020
$a
9783030993504
$q
(paper)
024
7
$a
10.1007/978-3-030-99351-1
$2
doi
035
$a
978-3-030-99351-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
HF5548.32
$b
.B2 2022
072
7
$a
UF
$2
bicssc
072
7
$a
KJE
$2
bicssc
072
7
$a
COM064000
$2
bisacsh
072
7
$a
UXJ
$2
thema
072
7
$a
KJE
$2
thema
082
0 4
$a
381.142
$2
23
090
$a
HF5548.32
$b
.B618 2022
100
1
$a
Birjoveanu, Catalin V.
$3
3601586
245
1 0
$a
Secure multi-party e-commerce protocols
$h
[electronic resource] /
$c
by Catalin V. Birjoveanu, Mirela Birjoveanu.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
x, 109 p. :
$b
ill., digital ;
$c
24 cm.
338
$a
online resource
$b
cr
$2
rdacarrier
490
1
$a
SpringerBriefs in computer science,
$x
2191-5776
505
0
$a
1. Introduction -- 2. Two-Party E-Commerce Protocols -- 3. Multi-Party E-Commerce Protocols for Complex Transactions -- 4. E-Commerce Protocols for Multi-Chained Complex Transactions -- 5. Formal Verification of Multi-Party Fair Exchange E-Commerce Protocols -- 6. Conclusions.
520
$a
This book presents the state of the art for multi-party fair exchange protocols and provides insight details regarding multi-party applications for buying physical products. The authors tackle the fairness problem in e-commerce protocols for buying physical products in scenarios involving complex and chained transactions and provide use cases of these protocols for B2C and B2B scenarios. The book also includes the formal verification of the fair multi-party exchange e-commerce protocols using the Constraint-Logic-based Attack Searcher from AVISPA, a tool for the Automated Validation of Internet Security Protocols and Applications. This book is mainly targeted to researchers in e-commerce security, yet it shall be interesting as well for professional developers in e-commerce. They all are provided with an understanding of and a starting point for designing secure multi-party e-commerce protocols.
650
0
$a
Electronic commerce
$x
Security measures.
$3
590545
650
1 4
$a
e-Commerce and e-Business.
$3
3591724
650
2 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer Application in Administrative Data Processing.
$3
3594379
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
650
2 4
$a
Security Services.
$3
3382346
700
1
$a
Birjoveanu, Mirela.
$3
3601587
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
SpringerBriefs in computer science.
$3
1567571
856
4 0
$u
https://doi.org/10.1007/978-3-030-99351-1
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9443378
電子資源
11.線上閱覽_V
電子書
EB HF5548.32 .B2 2022
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入