Amazon cover image
Image from Amazon.com

Secure Multi-Party E-Commerce Protocols [electronic resource] /

By: Contributor(s): Material type: TextTextSeries: SpringerBriefs in Computer SciencePublisher: Cham : Springer International Publishing : Imprint: Springer, 2022Edition: 1st ed. 2022Description: X, 109 p. 15 illus., 5 illus. in color. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783030993511
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 381.142 23
LOC classification:
  • HF5548.32-.33
Online resources:
Contents:
1. Introduction -- 2. Two-Party E-Commerce Protocols -- 3. Multi-Party E-Commerce Protocols for Complex Transactions -- 4. E-Commerce Protocols for Multi-Chained Complex Transactions -- 5. Formal Verification of Multi-Party Fair Exchange E-Commerce Protocols -- 6. Conclusions.
In: Springer Nature eBookSummary: This book presents the state of the art for multi-party fair exchange protocols and provides insight details regarding multi-party applications for buying physical products. The authors tackle the fairness problem in e-commerce protocols for buying physical products in scenarios involving complex and chained transactions and provide use cases of these protocols for B2C and B2B scenarios. The book also includes the formal verification of the fair multi-party exchange e-commerce protocols using the Constraint-Logic-based Attack Searcher from AVISPA, a tool for the Automated Validation of Internet Security Protocols and Applications. This book is mainly targeted to researchers in e-commerce security, yet it shall be interesting as well for professional developers in e-commerce. They all are provided with an understanding of and a starting point for designing secure multi-party e-commerce protocols.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

1. Introduction -- 2. Two-Party E-Commerce Protocols -- 3. Multi-Party E-Commerce Protocols for Complex Transactions -- 4. E-Commerce Protocols for Multi-Chained Complex Transactions -- 5. Formal Verification of Multi-Party Fair Exchange E-Commerce Protocols -- 6. Conclusions.

This book presents the state of the art for multi-party fair exchange protocols and provides insight details regarding multi-party applications for buying physical products. The authors tackle the fairness problem in e-commerce protocols for buying physical products in scenarios involving complex and chained transactions and provide use cases of these protocols for B2C and B2B scenarios. The book also includes the formal verification of the fair multi-party exchange e-commerce protocols using the Constraint-Logic-based Attack Searcher from AVISPA, a tool for the Automated Validation of Internet Security Protocols and Applications. This book is mainly targeted to researchers in e-commerce security, yet it shall be interesting as well for professional developers in e-commerce. They all are provided with an understanding of and a starting point for designing secure multi-party e-commerce protocols.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in