Protocols for secure electronic commerce:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton
CRC Press, Taylor & Francis Group
[2016]
|
Ausgabe: | Third edition |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturverzeichnis Seite 415-440 |
Beschreibung: | xxxiii, 461 pages Illustrationen, Diagramme 29 cm |
ISBN: | 9781482203745 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV043724641 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 160819s2016 xxua||| |||| 00||| eng d | ||
010 | |a 015040118 | ||
020 | |a 9781482203745 |9 978-1-4822-0374-5 | ||
035 | |a (OCoLC)957517241 | ||
035 | |a (DE-599)BVBBV043724641 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-573 | ||
084 | |a ST 520 |0 (DE-625)143678: |2 rvk | ||
100 | 1 | |a Sherif, Mostafa Hashem |4 aut | |
245 | 1 | 0 | |a Protocols for secure electronic commerce |c Mostafa Hashem Sherif |
250 | |a Third edition | ||
264 | 1 | |a Boca Raton |b CRC Press, Taylor & Francis Group |c [2016] | |
300 | |a xxxiii, 461 pages |b Illustrationen, Diagramme |c 29 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturverzeichnis Seite 415-440 | ||
650 | 4 | |a Electronic commerce | |
650 | 4 | |a Bank credit cards | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Electronic Commerce |0 (DE-588)4592128-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronischer Zahlungsverkehr |0 (DE-588)4014359-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Electronic Commerce |0 (DE-588)4592128-3 |D s |
689 | 0 | 1 | |a Elektronischer Zahlungsverkehr |0 (DE-588)4014359-4 |D s |
689 | 0 | 2 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 4 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 5 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 6 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
856 | 4 | 2 | |m HEBIS Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029136636&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-029136636 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804176519131561984 |
---|---|
adam_text | THIRD EDITION
Protocols to Secure
Electronic Commerce
Mostafa Hashem Sherif
CRC Press
Taylor amp; Francis Group
Boca Raton London New York
CRC Press is an imprint of the
Taylor amp; Francis Group, an informa business
Contents
Preface to the Third Edition xix
Preface to the Second Edition xxi
Preface to the First Edition xxiii
Author xxv
Acronyms xxvii
1 Overview of Electronic Commerce 1
1 1 Electronic Commerce and Mobile Commerce 1
111 Examples of Business-to-Business Commerce 2
112 Examples of Business-to-Consumer Commerce 3
1121 eBay 3
1122 Amazon 4
1123 Stamps com and Neopost 4
113 Examples of Proximity Commerce 4
114 Examples of Person-to-Person (Peer-to-Peer) Commerce 4
1 2 Effects of the Internet and Mobile Networks 5
1 3 Network Access 9
131 Wireline Access 9
132 Wireless Access 9
1 4 Barcodes 10
1 5 Smart Cards 13
1 6 Parties in Electronic Commerce 15
161 Banks 16
162 Payment Intermediaries 16
1621 Aggregators 17
1622 Gateways 17
1623 Payment Processors 17
1624 Certification Authorities and Trusted Service Managers 17
163 Providers and Manufacturers 17
1 7 Security 18
171 Loss of Control 18
172 Loss of Confidentiality 18
173 Loss of Service 18
1 8 Summary 18
Questions 19
2 Money and Payment Systems 21
2 1 Mechanisms of Classical Money 21
2 2 Payment Instruments 23
221 Cash 24
222 Checks 26
223 Credit Transfers 29
224 Direct Debit 32
225 Interbank Transfers 32
226 Bills of Exchange 32
227 Payment Cards 33
v
vi Contents
2 3 Types of Dematerialized Monies 40
231 Electronic Money 40
232 Virtual Money 40
233 Digital Money 41
2 4 Purses, Holders, and Wallets 41
241 Electronic Purses and Electronic Token (Jeton) Holders 41
242 Virtual Purses and Virtual Jeton Holders 42
243 Digital Wallets 43
244 Diffusion of Electronic Purses 43
2 5 Transactional Properties of Dematerialized Currencies 44
251 Anonymity 45
252 Traceability 45
2 6 Overall Comparison of the Means of Payment 46
2 7 Practice of Dematerialized Money 47
271 Protocols of Systems of Dematerialized Money 47
272 Direct Payments to the Merchant 49
273 Payment via an Intermediary 49
2 8 Clearance and Settlement in Payment Systems 51
281 United States 53
282 United Kingdom 55
283 France 55
2 9 Drivers of Innovation in Banking and Payment Systems 56
291 Technical Developments 56
292 Business Needs 57
293 User Preferences 57
294 Legislation and Regulation 58
295 Standards 58
296 Ideology 59
2 10 Summary 59
Questions 59
3 Algorithms and Architectures for Security 61
3 1 Security of Open Financial Networks 61
3 2 OSI Model for Cryptographic Security 62
321 OSI Reference Model 62
322 Security Services: Definitions and Location 62
3 3 Security Services at the Link Layer 63
3 4 Security Services at the Network Layer 64
3 5 Security Services at the Application Layer 66
3 6 Message Confidentiality 67
361 Symmetric Cryptography 67
362 Public Key Cryptography 67
3 7 Data Integrity 69
371 Verification of the Integrity with a One-Way Hash Function 69
372 Verification of the Integrity with Public Key Cryptography 71
373 Blind Signature 71
374 Verification of the Integrity with Symmetric Cryptography 72
3 8 Identification of the Participants 74
3 9 Biometric Identification 74
391 Fingerprint Recognition 75
392 Iris Recognition 76
393 Face Recognition 77
394 Voice Recognition 78
395 Signature Recognition 78
Contents vii
396 Keystroke Recognition 79
397 Hand Geometry 79
398 Retinal Recognition 79
399 Additional Standards 79
3 9 10 Summary and Evaluation 80
3 10 Authentication of the Participants 81
3 11 Access Control 82
3 12 Denial of Service 83
3 13 Nonrepudiation 85
3 13 1 Time Stamping and Sequence Numbers 85
3 14 Secure Management of Cryptographic Keys 86
3 14 1 Production and Storage 86
3 14 2 Distribution 86
3 14 3 Utilization, Withdrawal, and Replacement 86
3 14 4 Key Revocation 87
3 14 5 Deletion, Backup, and Archiving 87
3 14 6 A Comparison between Symmetric and Public Key Cryptography 87
3 15 Exchange of Secret Keys: Kerberos 87
3 15 1 Message (1): Request of a Session Ticket 88
3 15 2 Message (2): Acquisition of a Session Ticket 88
3 15 3 Message (3): Request of a Service Ticket 89
3 15 4 Message (4): Acquisition of the Service Ticket 89
3 15 5 Message (5): Service Request 89
3 15 6 Message (6): Optional Response of the Server 89
3 16 Public Key Kerberos 90
3 16 1 Where to Find Kerberos? 90
3 17 Exchange of Public Keys 90
3 17 1 The Diffie-Hellman Exchange 90
3 17 2 Internet Security Association and Key Management Protocol 91
3 18 Certificate Management 92
3 18 1 Basic Operation 94
3 18 2 Description of an X 509 Certificate 94
3 18 3 Attribute Certificates 95
3 18 4 Certification Path 95
3 18 5 Hierarchical Certification Path 97
3 18 6 Distributed Trust Model 98
3 18 7 Certificate Classes 98
3 18 8 Certificate Revocation 99
3 18 9 Archival 99
3 18 10 Recovery 100
3 18 11 Banking Applications 100
3 19 Authentication 100
3 19 1 Procedures for Strong Authentication 100
3 19 1 1 One-Way Authentication 100
3 19 1 2 Two-Way Authentication 101
3 19 1 3 Three-Way Authentication 101
3 20 Security Cracks 101
3 20 1 Problems with Certificates 102
3 20 2 Underground Markets for Passwords 102
3 20 3 Encryption Loopholes 103
3 20 4 Phishing, Spoofing, and Pharming 104
3 21 Summary 106
3A Appendix: Principles of Symmetric Encryption 106
3A 1 Block Encryption Modes of Operation 106
viii Contents
3A 2 Examples of Symmetric Block Encryption Algorithms 112
3A 2 1 DES and Triple DES 112
3A 2 2 AES 113
3A 2 3 RC4 114
3A 2 4 New European Schemes for Signature, Integrity, and Encryption 114
3A 2 5 eSTREAM 114
3A 2 6 IDEA 115
3A 2 7 SKIPJACK 115
3B Appendix: Principles of Public Key Encryption 115
3B 1 RSA 115
3B 1 1 Chosen-Ciphertext Attacks 115
3B 1 2 Practical Considerations 116
3B 2 Public Key Cryptography Standards 116
3B 3 PGP and OpenPGP 117
3B 4 Elliptic Curve Cryptography 117
3C Appendix: Principles of the Digital Signature Algorithm and the Elliptic Curve
Digital Signature Algorithm 118
Questions 119
4 Business-to-Business Commerce 121
4 1 Drivers for Business-to-Business Electronic Commerce 121
411 Progress in Telecommunications and Information Processing 121
412 Globalization 121
413 Quest for Organizational Agility 122
414 Personalization of Products and Services 122
415 The Legal Environment and Regulatory Compliance 122
4 2 Four Stages of Systems Integration 123
421 Interconnectivity 123
422 Functional Interoperability 123
423 Semantic Interoperability 124
424 Optimization and Innovation 124
4 3 Overview of Business-to-Business Commerce 124
4 4 Short History of Business-to-Business Electronic Commerce 126
4 5 Examples of Business-to-Business Electronic Commerce 126
451 Banking Applications 126
452 Aeronautical Applications 127
453 Applications in the Automotive Industry 127
454 Other Industries 128
4 6 Evolution of Business-to-Business Electronic Commerce 128
4 7 Implementation of Business-to-Business Electronic Commerce 129
4 8 X12 and EDIFACT 130
481 Definitions 131
482 ANSI X12 131
483 EDIFACT 132
4831 UNB/UNZ and UIB/UIZ Segments 132
4832 UNH/UNT Segments 133
4833 The UNS Segment 133
4834 UNG/UNE Segments 133
4835 UNO/UNP Segments 133
4836 Structure of an Interchange 134
4837A Partial List of EDIFACT Messages 134
4838 Interactive EDIFACT 134
484 Structural Comparison between X12 and EDIFACT 135
Contents ix
4 9 EDI Messaging 135
491X 400 135
492 The Internet (SMTP/MIME) 136
4 10 The Security of EDI 137
4 10 1 X12 Security 137
4 10 2 EDIFACT Security 137
4 10 2 1 Security of EDIFACT Documents Using In-Band Segments 138
4 10 2 2 Security of EDIFACT Documents with Out-of-Band Segments: The AUTACK
Message 140
4 10 3 Protection of EDI Messages in Internet Mail 142
4 10 4 Protocol Stacks for EDI Messaging 142
4 11 Integration of XML and Traditional EDI 143
4 11 1 BizTalk® 143
4 11 2 xCBL 144
4 11 3 UBL 144
4 12 New Architectures for Business-to-Business Electronic Commerce 144
4 13 Electronic Business (Using) Extensible Markup Language 146
4 13 1 Architecture of ebXML 146
4 13 2 Business Scenarios 146
4 13 3 Core Components 147
4 13 4 Registry and Repository 148
4 13 5 CPPA 148
4 13 6 Message Service Specification 148
4 13 7 ebXML Operations 148
4 14 Web Services 149
4 14 1 Web Services Standards 150
4 14 2 Web Services Description Language 151
4 14 3 Universal Description, Discovery, and Integration 151
4 14 4 Simple Object Access Protocol 151
4 14 5 Security 151
4 14 6 Standardization of Web Services 153
4 15 Relation of EDI with Electronic Funds Transfer 153
4 15 1 Funds Transfer with EDIFACT 155
4 15 2 Fund Transfers with X12 156
4 15 3 Financial Dialects of XML 156
4 15 4 Electronic Billing 157
4 15 5 An Example for EDI Integration with Business Processes 158
4 16 Summary 159
Questions 160
5 Transport Layer Security and Secure Sockets Layer 161
5 1 Architecture of SSL/TLS 161
5 2 SSL/TLS Security Services 161
521 Authentication 162
522 Confidentiality 163
523 Integrity 164
524 Summary of Security Algorithms 164
525 TLS Cryptographic Vulnerabilities 164
5251 Initialization Vector Attack (BEAST Attack) 165
5252 The RC4 Statistical Bias Attack 165
5 2 53 Forging X 509 Certificates 165
5 3 SSL/TLS Subprotocols 165
531 SSL/TLS Exchanges 166
X
Contents
532 State Variables of an SSL/TLS Session 166
533 State Variables for an SSL/TLS Connection 167
534 Synopsis of Parameters Computation 167
535 The Handshake Protocol 168
5351 General Operation 168
5 3 52 Opening a New Session 168
5353 Authentication of the Server 171
5354 Exchange of Secrets 172
5355 Key Derivation for SSL 172
5356 Key Derivation for TLS 173
5357 Exchange Verification 174
5358 Verification and Confirmation by the Server 174
536 The ChangeCipherSpec Protocol 175
537 Record Protocol 175
538 Connection Establishment 176
539 Renegotiation or Rehandshake 178
5 3 10 The Alert Protocol 181
5 3 10 1 The Bleichenbacher Attack 182
5 3 10 2 Padding Attacks 183
5 3 11 Denial-of-Service Attacks 183
5 4 Performance of SSL/TLS 185
5 5 Implementation Pitfalls 185
5 6 Summary 187
Questions 188
6 Wireless Transport Layer Security 189
6 1 Architecture 189
6 2 From TLS to WTLS 189
621 Identifiers and Certificates 190
622 Cryptographic Algorithms 191
623 Handshake Messages and Exchanges 192
624 Calculation of Secrets 193
6241 Computation of the PreMasterSecret 193
6242 Computation of MasterSecret 193
625 Alert Messages 194
6 3 Operational Constraints 194
631 Positioning of the WAP/Web Gateway 194
632 ITLS 196
633 NAETEA 196
6 4 WAP 2 0 and TLS Extensions 198
6 5 WAP Browsers 199
6 6 Summary 199
Questions 201
7 The SET Protocol 203
7 1 SET Architecture 203
7 2 Security Services of SET 204
721 Cryptographic Algorithms 205
722 Dual Signature 207
7 3 Certification 208
731 Certificate Management 208
732 Registration of the Participants 209
7321 Cardholder Registration 209
7322 Merchant s Registration 212
Contents xi
7 4 Purchasing Transaction 213
741 SET Payment Messages 213
742 Transaction Progress 213
7421 Initialization 213
7422 Order Information and Payment Instructions 214
7423 Authorization Request 216
7424 Granting Authorization 218
7425 Capture 220
7 5 Optional Procedures 220
7 6 Efforts to Promote SETs 221
761 SET Reference Implementation (SETFEF) and Conformance Tests 221
762 SETs and Integrated Circuit Cards 221
763 Hybrid TLS/SET Architecture 222
7631 3D SET 222
7632 SET Fäcil 223
7 7 SET versus TLS/SSL 223
7 8 Summary 224
Questions 225
8 Payments with Magnetic Stripe Cards 227
8 1 Point-of-Sale Transactions 227
8 2 Communication Standards for Card Transactions 230
8 3 Security of Point-of-Sale Transactions 231
831 PCI Standards 231
832 Point-to-Point Encryption 232
833 Point-of-Sale Fraud 232
8 4 Internet Transactions 233
841 Screening for Risks 234
842 Online Security Code 235
843 Perishable Card Numbers 235
844 One-Time Passwords 236
845 Online Fraud in North America 237
8 5 3-D Secure 238
851 Enrollment 239
852 Purchase and Payment Protocol 240
853 Clearance and Settlement 241
854 Security 241
855 Evaluation 242
8 6 Migration to EMV 243
8 7 Summary 244
Questions 245
9 Secure Payments with Integrated Circuit Cards 247
9 1 Description of Integrated Circuit Cards 247
911 Memory Types 247
912 Processing Capabilities 248
913 Operating Systems 248
914 Integrated Circuit Cards with Contacts 248
915 Contactless Integrated Circuit Cards 249
9 2 Integration of Smart Cards with Computer Systems 249
921 OpenCard Framework 250
922 PC/SC 250
923 Movement for the Use of Smart Cards in a Linux Environment 251
924 Financial Transactional IC Card Reader (FINREAD) 251
Contents
xii
9 3 Standards for Integrated Circuit Cards 252
931 ISO Standards for Integrated Circuit Cards 252
932 ISO Standards for Contactless Cards 253
9321 Anticollision Protocols 253
9322 Type A Anticollision Protocol 254
9323 Type B Anticollision Protocol 254
933 RFID Standards 254
9331 ISO Standards 255
93 32 EPCglobal® 255
9333 Open Specifications 257
9334 Privacy Concerns 257
934 Near-Field Communication Standards 257
935 File System of Integrated Circuits Cards 258
9351 Swedish Electronic Identity Card 259
9352 Subscriber Identity Module of GSM Terminals 259
9 4 Multiapplication Smart Cards 261
941 Management of Applications in Multiapplication Cards 261
9411 Secondary Applications Controlled by the Primary Application 261
9412 Federation of Several Applications under a Central Authority 261
9413 Independent Multiapplications 262
942 Java Virtual Machine 263
9 5 Security of Integrated Circuit Cards 263
951 Security during Production 263
952 Physical Security of the Card during Usage 265
953 Logical Security of the Card during Usage 265
9531 Authentication with Symmetric Encryption 266
9532 Authentication with Public Key Encryption 266
9 6 Payment Applications of Integrated Circuit Cards 267
961 Historical Smart Card of French Banks 267
962 Speedpass 268
963 Toll Collection Systems 268
9631 Subscription 268
9632 Virtual Purse 268
9633 Security 269
9634 Interoperability 269
9 7 EMV® Card 269
971 EMV Cryptography 270
9711 Static Data Authentication 270
9712 Dynamic Data Authentication 271
9713 Combined Dynamic Data Authentication 271
972 EMV Operation 272
9721 Offline Authorization 272
9 722 Online Authorization 274
973 EMV Limitations 276
974 EMV Tokenization 276
975 Other Attacks on EMV 277
9751 Attacks Due to Backward Compatibility 277
9752 Man-in-the-Middle Attacks 278
9753 Relay Attacks 278
9 8 General Consideration on the Security of Smart Cards 280
981 Physical (Destructive) Attacks 280
982 Logical (Noninvasive) Attacks 280
983 Attacks against the Chip-Reader Communication Channel 280
Contents
xiii
984 Relay Attacks on Contactless Cards 281
9 9 Summary 282
Questions 282
10 Mobile Payments 283
10 1 Reference Model for Mobile Commerce 283
10 1 1 Bank-Centric Model 284
10 1 2 Mobile Operator-Centric Model 284
10 1 3 Third-Party Service Provider Model 284
10 1 4 Collaborative Model 284
10 1 5 Manufacturer-Centric Model 285
10 2 Secure Element in Mobile Phones 285
10 2 1 Option 1 285
10 2 2 Option 2 286
10 2 3 Option 3 286
10 2 4 Option 4 286
10 2 5 Option 5 286
10 2 6 Option 6 286
10 2 7 Near-Field Communication Terminals 286
10 2 8 Java™ 2 Platform Micro Edition 286
10 2 9 Unauthorized Access to the Secure Element 287
10 2 10 User Authentication 287
10 3 Barcodes 287
10 4 Bluetooth 288
10 4 1 Highlights of Bluetooth History 289
10 4 2 Security of Bluetooth 290
10 5 Near-Field Communication 291
10 5 1 Tag Types 291
10 5 2 Operating Modes 291
10 5 3 Transaction Authorization 293
10 5 4 Security of NFC Communications 294
10 541 Spoofing of NFC Tags 295
10 542 Relay Attacks 295
10 6 Text Messages 296
10 6 1 Short Message Service 296
10 6 2 SIM Application Toolkit (STK/SAT/USIM) 296
10 6 3 Unstructured Supplementary Service Data 296
10 6 4 Over-the-Air Application Provisioning 296
10 7 Bank-Centric Offers 297
10 8 Mobile Operator-Centric Offers 297
10 8 1 Offers in Industrialized Countries 297
10 811 Paiement CB sur Mobile 297
10 812 QuickTap 297
10 813 Softcard (ISIS) Mobile Wallet 298
10 8 2 M-PESA 298
10 9 Third-Party Service Offers 298
10 9 1 Apple Pay and Passbook 298
10 9 2 Deutsche Bahn s Touch and Travel 299
10 9 3 Google Wallet 299
10 931 Account Activation 300
10 932 Payment and Compensation 300
10 933 Revenue Sources 300
10 934 Security 300
XIV
Contents
10 9 4 Paybox 301
10 941 Purchase Payments 301
10 942 Person-to-Person Transactions 302
10 943 Business Model 302
10 944 Additional Privacy Measure 302
10 10 Collaborative Offers 302
10 10 1 Mobito 302
10 10 2 Mpass 302
10 10 3 Pay2Me 303
10 11 Payments from Mobile Terminals 303
10 11 1 iZettle 303
10 11 2 Payleven 303
10 11 3 Paym 304
10 11 4 Square 304
10 11 5 Starbucks Card Mobile 304
10 11 6 Zoosh 305
10 12 Summary 305
Questions 305
11 Micropayments 307
11 1 Characteristics of Micropayment Systems 307
11 1 1 Prepayment 307
11 1 2 Offline Authorization 307
11 1 3 Aggregation of Transactions 308
11 1 4 Reduced Computational Intensity 308
11 1 5 Routing through the ACH Network 308
11 1 6 Management of Micropayments 308
11 2 Standardization Efforts 308
11 2 1 Common Electronic Purse Specifications 308
11 211 Authentication of the Purse by the Issuer 309
11 212 Loading of Value 309
11 213 Point-of-Sale Transactions 309
11 2 2 GlobalPlatform 309
11 2 3 Electronic Commerce Modeling Language 310
11 3 Electronic Purses 310
11 3 1 Advantis 310
11 3 2 FeliCa 311
11 3 3 GeldKarte 311
11 331 Registration and Loading of Value 311
11 332 Payment 312
11 333 Security 313
11 3 4 Proton 314
11 4 Online Micropayments 315
11 4 1 The First Generation 315
11 411 First Virtual 315
11 412 KLELine 316
11 413 ClickandBuy 316
11 414 Bankpass Web 317
11 4 2 The Second Generation 317
11 421 Pay per Click 317
11 422 Payment Kiosks 317
11 423 Prepaid Cards 318
11 424 Virtual Purses 319
11 4 3 The Third Generation 320
Contents
xv
11 5 Research Projects 320
11 5 1 Millicent 320
11 511 Secrets 321
11 512 Description of the Scrip 321
11 513 Registration and Loading of Value 322
11 514 Purchase 323
11 515 Evaluation 323
11 5 2 NetBill 324
11 521 Registration and Loading of Value 325
11 522 Purchase 325
11 523 Financial Settlement 328
11 524 Evaluation 328
11 5 3 PayWord 328
11 531 Registration and Loading of Value 329
11 532 Purchase 329
11 533 Financial Settlement 330
11 534 Computational Load 331
11 535 Evaluation 331
11 5 4 MicroMint 331
11 541 Registration and Loading of Value 332
11 542 Purchase 332
11 543 Financial Settlement 332
11 544 Security 332
11 5 5 Evaluation of the Research Projects for Online Micropayments 333
11 6 Market Response to Micropayment Systems 333
11 7 Summary 335
Questions 335
12 PayPal 337
12 1 Evolution of PayPal 337
12 2 Individual Accounts 338
12 2 1 Payment with Credit Cards 339
12 2 2 Payment with PayPal Account Balance 339
12 2 3 Payment with Bank Accounts 342
12 2 4 Mobile Payments 342
12 2 5 Fraud Prevention 342
12 3 Business Accounts 343
12 3 1 Merchant Registration 343
12 3 2 Flosted Services 344
12 3 3 Mobile Point-of-Sale Terminals 344
12 4 Summary 345
Questions 345
13 Digital Money 347
13 1 Privacy with Cash and Digital Money 347
13 2 DigiCash (eCash) 348
13 2 1 Registration 348
13 2 2 Loading of Value 349
13 2 3 Purchase 349
13 2 4 Financial Settlement 350
13 2 5 Delivery 350
13 3 Anonymity and Untraceability in DigiCash 350
13 3 1 Case of the Debtor (Buyer) Untraceability 350
13 311 Loading of Value 350
xvi Contents
13 312 Purchase 351
13 313 Deposit and Settlement 351
13 314 Improvement of Protection 351
13 3 2 Case of the Creditor (Merchant) Untraceability 351
13 3 3 Mutual Untraceability 352
13 4 Splitting of Value 352
13 5 Detection of Counterfeit (Multiple Spending) 354
13 5 1 Loading of Value 354
13 5 2 Purchasing 355
13 5 3 Financial Settlement and Verification 355
13 5 4 Proof of Double Spending 355
13 6 Evaluation of DigiCash 355
Questions 356
14 Bitcoin and Cryptocurrencies 357
14 1 Background 357
14 2 Bitcoin Protocol 359
14 2 1 Bitcoin Nodes 360
14 2 2 Bitcoin Wallets 361
14 2 3 Blockchain 363
14 2 4 Mining 364
14 2 5 Proof-of-Work Algorithm 365
14 2 6 Adjustment of the Difficulty 366
14 2 7 Hashing Race 367
14 2 8 Mining Pools 367
14 3 Operation 368
14 3 1 Getting Bitcoins 368
14 3 2 Bitcoin Address 370
14 3 3 Key Formats 371
14 3 4 Bitcoin Transaction 372
14 3 5 Orphaned Blocks 374
14 3 6 Anonymity 375
14 3 7 Point-of-Sale Applications 378
14 3 8 Double Spending 378
14 3 9 The Protocol Evolution 378
14 4 Risk Evaluation 379
14 4 1 Limited Supply 379
14 4 2 Loss, Theft, and Irreversibility 380
14 4 3 Volatility 380
14 4 4 Opacity 381
14 4 5 Lack of Independent Review 381
14 4 6 Unknown Software Risks 382
14 4 7 Energy Consumption 382
14 4 8 Regulations 383
14 5 Summary and Conclusions 384
14A Appendix: The Crypto Anarchist Manifesto 384
14B Appendix: Bitcoin as a Social Phenomenon 385
14B 1 Anarcho-Libertarian Response to the Social and Political Environment 386
14B 2 Bitcoin Religion 386
14C Appendix: Other Significant Cryptocurrencies 387
14C 1 Ripple 388
14C 2 Litecoin 388
14C 3 Dash (Darkcoin) 389
14C 4 BitShares 389
Contents xvii
14C 5 Dogecoin 390
14C 6 Stellar 390
14C 7 Nxt 390
14C 8 MaidSafeCoin 390
14C 9 Paycoin 391
14D Appendix: Service Offers Based on Bitcoin 391
14D 1 Bitmessage 391
14D 2 Bitnotar 391
14D 3 Blocktrace 391
14D 4 ChronoBit 391
14D 5 CoinSpark 391
14D 6 Namecoin 391
Questions 392
15 Dematerialized Checks 393
15 1 Processing of Paper Checks 393
15 2 Dematerialized Processing of Checks 393
15 2 1 Electronic Check Presentment (Check Truncation) 394
15 2 2 Check Imaging 395
15 2 3 ICL File Structure 396
15 2 4 Remote Deposit Capture 396
15 3 Virtual Checks 397
15 3 1 Representation of eChecks 397
15 3 2 Payment and Settlement with eChecks 398
15 4 Summary 402
Questions 402
16 Electronic Commerce in Society 403
16 1 Harmonization of Communication Interfaces 403
16 2 Governance of Electronic Money 404
16 3 Protection of Intellectual Property 405
16 4 Electronic Surveillance and Privacy 406
16 4 1 Disclosure of Personal Information Online 406
16 4 2 Data Breaches 407
16 4 3 Monetizing Personal Data 407
16 4 4 Government Spying 409
16 4 5 Technologies for Privacy Protection 410
16 5 Content Filtering and Censorship 411
16 6 Taxation of Electronic Commerce 411
16 7 Trust Promotion 412
16 8 Archives Dematerialization 412
16 9 Summary 413
Questions 414
References 415
Websites 441
|
any_adam_object | 1 |
author | Sherif, Mostafa Hashem |
author_facet | Sherif, Mostafa Hashem |
author_role | aut |
author_sort | Sherif, Mostafa Hashem |
author_variant | m h s mh mhs |
building | Verbundindex |
bvnumber | BV043724641 |
classification_rvk | ST 520 |
ctrlnum | (OCoLC)957517241 (DE-599)BVBBV043724641 |
discipline | Informatik |
edition | Third edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02322nam a2200553 c 4500</leader><controlfield tag="001">BV043724641</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">160819s2016 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">015040118</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781482203745</subfield><subfield code="9">978-1-4822-0374-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)957517241</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043724641</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 520</subfield><subfield code="0">(DE-625)143678:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sherif, Mostafa Hashem</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Protocols for secure electronic commerce</subfield><subfield code="c">Mostafa Hashem Sherif</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Third edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">CRC Press, Taylor & Francis Group</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxxiii, 461 pages</subfield><subfield code="b">Illustrationen, Diagramme</subfield><subfield code="c">29 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverzeichnis Seite 415-440</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Bank credit cards</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronischer Zahlungsverkehr</subfield><subfield code="0">(DE-588)4014359-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Elektronischer Zahlungsverkehr</subfield><subfield code="0">(DE-588)4014359-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HEBIS Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029136636&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029136636</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV043724641 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:33:28Z |
institution | BVB |
isbn | 9781482203745 |
language | English |
lccn | 015040118 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029136636 |
oclc_num | 957517241 |
open_access_boolean | |
owner | DE-573 |
owner_facet | DE-573 |
physical | xxxiii, 461 pages Illustrationen, Diagramme 29 cm |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | CRC Press, Taylor & Francis Group |
record_format | marc |
spelling | Sherif, Mostafa Hashem aut Protocols for secure electronic commerce Mostafa Hashem Sherif Third edition Boca Raton CRC Press, Taylor & Francis Group [2016] xxxiii, 461 pages Illustrationen, Diagramme 29 cm txt rdacontent n rdamedia nc rdacarrier Literaturverzeichnis Seite 415-440 Electronic commerce Bank credit cards Computer networks Security measures Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Electronic Commerce (DE-588)4592128-3 gnd rswk-swf Kommunikationsprotokoll (DE-588)4128252-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Elektronischer Zahlungsverkehr (DE-588)4014359-4 gnd rswk-swf Electronic Commerce (DE-588)4592128-3 s Elektronischer Zahlungsverkehr (DE-588)4014359-4 s Kommunikationsprotokoll (DE-588)4128252-8 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Datenschutz (DE-588)4011134-9 s Zugriffskontrolle (DE-588)4293034-0 s 1\p DE-604 HEBIS Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029136636&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Sherif, Mostafa Hashem Protocols for secure electronic commerce Electronic commerce Bank credit cards Computer networks Security measures Zugriffskontrolle (DE-588)4293034-0 gnd Datenschutz (DE-588)4011134-9 gnd Datensicherung (DE-588)4011144-1 gnd Electronic Commerce (DE-588)4592128-3 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd Computersicherheit (DE-588)4274324-2 gnd Elektronischer Zahlungsverkehr (DE-588)4014359-4 gnd |
subject_GND | (DE-588)4293034-0 (DE-588)4011134-9 (DE-588)4011144-1 (DE-588)4592128-3 (DE-588)4128252-8 (DE-588)4274324-2 (DE-588)4014359-4 |
title | Protocols for secure electronic commerce |
title_auth | Protocols for secure electronic commerce |
title_exact_search | Protocols for secure electronic commerce |
title_full | Protocols for secure electronic commerce Mostafa Hashem Sherif |
title_fullStr | Protocols for secure electronic commerce Mostafa Hashem Sherif |
title_full_unstemmed | Protocols for secure electronic commerce Mostafa Hashem Sherif |
title_short | Protocols for secure electronic commerce |
title_sort | protocols for secure electronic commerce |
topic | Electronic commerce Bank credit cards Computer networks Security measures Zugriffskontrolle (DE-588)4293034-0 gnd Datenschutz (DE-588)4011134-9 gnd Datensicherung (DE-588)4011144-1 gnd Electronic Commerce (DE-588)4592128-3 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd Computersicherheit (DE-588)4274324-2 gnd Elektronischer Zahlungsverkehr (DE-588)4014359-4 gnd |
topic_facet | Electronic commerce Bank credit cards Computer networks Security measures Zugriffskontrolle Datenschutz Datensicherung Electronic Commerce Kommunikationsprotokoll Computersicherheit Elektronischer Zahlungsverkehr |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029136636&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT sherifmostafahashem protocolsforsecureelectroniccommerce |