Payment Technologies for E-Commerce

Similar documents
Enabling Flexibility in Process-Aware Information Systems

The Cinderella.2 Manual

Discrete, Continuous, and Hybrid Petri Nets

X.media.publishing. Multimedia Systems. Bearbeitet von Ralf Steinmetz, Klara Nahrstedt

Applied Information Security

IEC : Programming Industrial Automation Systems

Model-Driven Design Using Business Patterns

Concurrent Programming: Algorithms, Principles, and Foundations

Model Driven Architecture and Ontology Development

SCI: Scalable Coherent Interface

VLSI-Design of Non-Volatile Memories

Group-based Cryptography

Object-Process Methodology

Springer Monographs in Mathematics. Set Theory. The Third Millennium Edition, revised and expanded. Bearbeitet von Thomas Jech

A Study on Radio Access Technology Selection Algorithms

Handbook of Conceptual Modeling

Ajax in Oracle JDeveloper

Computational Biology

Abstract Computing Machines

Introductory Operations Research

UML The Unified Modeling Language, Modeling Languages and Applications

Wireless Algorithms, Systems, and Applications

Introduction to Reliable and Secure Distributed Programming

Guerrilla Capacity Planning

Embedded Robotics. Mobile Robot Design and Applications with Embedded Systems. Bearbeitet von Thomas Bräunl

Ruby on Rails for PHP and Java Developers

Information Retrieval for Music and Motion

Earth System Modelling - Volume 5

Monte Carlo Methods and Applications

Dynamic Taxonomies and Faceted Search

Advanced Man-Machine Interaction

Image and Geometry Processing for 3-D Cinematography

Advances in Information Systems

Conceptual Modelling in Information Systems Engineering

System Earth via Geodetic-Geophysical Space Techniques

Evolutionary Multi-Criterion Optimization

Web Component Development with Zope 3

Developments in 3D Geo-Information Sciences

Web Archiving. Bearbeitet von Julien Masanès

Object-Oriented Metrics in Practice

A Developer s Guide to the Semantic Web

Preference Learning. Bearbeitet von Johannes Fürnkranz, Eyke Hüllermeier

Enabling Technologies for Wireless E-Business

X.media.publishing. 3D Computer Vision. Efficient Methods and Applications. von Christian Wöhler. 1. Auflage

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18

Information Processing in Medical Imaging

Algorithms -- ESA 2004

Perspectives on Projective Geometry

Advanced Numerical Methods to Optimize Cutting Operations of Five Axis Milling Machines

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

Protocol engineering hartmut konig. Protocol engineering hartmut konig.zip

Implementing Security and Tokens: Current Standards, Tools, and Practices

City University of Hong Kong. Course Syllabus. offered by Department of Computer Science with effect from Semester B 2016/17

Direct vision prepaid visa

Contributors. Acknowledgements Abbreviations

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

Computers and Information Processing Technologies I

Generating Analog IC Layouts with LAYGEN II

How Tomcat Works: A Guide To Developing Your Own Java Servlet Container By Budi Kurniawan

E-commerce security: SSL/TLS, SET and others. 4.2

Digital Photo Editing For Seniors: Learn How To Edit Your Digital Photos With Arcsoft PhotoStudio (Computer Books For Seniors Series) By Addo Stuur

CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0

CPET 581 E-Commerce & Business Technologies. References

Starting Out With Java: From Control Structures Through Objects Plus MyProgrammingLab With Pearson EText -- Access Card Package (6th Edition) By Tony


Understanding and Writing Compilers

CSci530 Final Exam. Fall 2014

Algorithms & Data Structures 2

Contributions to pairing-based cryptography

Embedded Software and Systems

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Secure Web Transactions. Sridhar Iyer K R School of Information Technology IIT Bombay

Chinese Handwriting Recognition: An Algorithmic Perspective

The Design of an Anonymous and a Fair Novel E-cash System

A simple approach of Peer-to-Peer E-Cash system

Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004

[EPUB] ABAP DE DYNPROS MANUALS

716 West Ave Austin, TX USA

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Leveraging the full potential of NFC to reinvent physical access control. Friday seminar,

On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme

Test Conditions. Closed book, closed notes, no calculator, no laptop just brains 75 minutes. Steven M. Bellovin October 19,

Daf Kompakt B1 Intensivtrainer

Cryptography And Network Security: Principles And Practice (3rd Edition) By William Stallings READ ONLINE

Contents. Introduction... xvii

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

Research on Heterogeneous Communication Network for Power Distribution Automation

Smart Cards, Tokens, Security And Applications

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

CrowdInvesting The 7 Dumbest Mistakes When Investing In Private Companies (CrowdFunding & CrowdInvesting Series) [Kindle Edition] By Simon

CRYPTOGRAPHY AND NETWORK SECURITY

Keysight Technologies I 2 C and SPI Protocol Triggering and Decode

DEPARTMENT OF COMPUTER APPLICATIONS B.C.A. - THIRD YEAR ( REGULATION) SIXTH SEMESTER LESSON PLAN SRM UNIVERSITY

BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN

Contents. Preface. Acknowledgments. xxiii. List of Acronyms i xxv

School of Computer Science

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM

Cryptanalysis on Two Certificateless Signature Schemes

Security+ SY0-501 Study Guide Table of Contents

Joomla!: Einführung In Das Populäre CMS (German Edition) By Ralph Steyer

Transcription:

Payment Technologies for E-Commerce Bearbeitet von Weidong Kou 1. Auflage 2003. Buch. IX, 334 S. Hardcover ISBN 978 3 540 44007 9 Format (B x L): 15,5 x 23,5 cm Gewicht: 1470 g Wirtschaft > Spezielle Betriebswirtschaft > E-Commerce, E-Business, E-Marketing Zu Leseprobe schnell und portofrei erhältlich bei Die Online-Fachbuchhandlung beck-shop.de ist spezialisiert auf Fachbücher, insbesondere Recht, Steuern und Wirtschaft. Im Sortiment finden Sie alle Medien (Bücher, Zeitschriften, CDs, ebooks, etc.) aller Verlage. Ergänzt wird das Programm durch Services wie Neuerscheinungsdienst oder Zusammenstellungen von Büchern zu Sonderpreisen. Der Shop führt mehr als 8 Millionen Produkte.

Table of Contents 1 Introduction to E-Payment: An Essential Piece of the E-Commerce Puzzle Weidong Kou...... 1 1.1 Introduction.... 1 1.2 About This Book.... 3 1.3 References...... 6 2 Security Fundamentals Fangguo Zhang and Yumin Wang... 7 2.1 Electronic Commerce Security... 7 2.2 Introduction to Cryptography.. 9 2.3 Symmetric Cryptosystems.. 13 2.4 Public-Key Cryptography... 17 2.5 Digital Signatures.... 24 2.6 Cryptographic Hash Functions.... 30 2.7 Cryptographic Random Number Generators 31 2.8 Authentication 32 2.9 Summary.. 37 2.10 References...... 38 3 Public-Key Infrastructure Hui Li and Yumin Wang........ 39 3.1 Introduction..... 39 3.2 X.509... 50 3.3 Credential-Based PKI Systems... 61 3.4 Summary.... 67 3.5 References...... 67 4 Biometrics for Security in E-Commerce David Zhang and Li Yu........ 71 4.1 An Overview of Biometrics..... 71 4.2 Potential Application Areas.... 79 4.3 Multiple Authentication Technologies... 83

vi Table of Contents 4.4 How to Select a Biometrics System.... 86 4.5 Summary...... 92 4.6 References.... 92 5 Smart Cards and Applications Weidong Kou, Simpson Poon, and Edwin M. Knorr....... 95 5.1 Introduction..... 95 5.2 Fundamentals of Smart Card Systems. 97 5.3 Java Card.... 106 5.4 Smart Card Standards...... 109 5.5 Smart Cards and Security.... 111 5.6 Smart Card Applications..... 114 5.7 A Case Study in Smart Cards: Hong Kong s Octopus Card... 118 5.8 Summary.... 125 5.9 References...... 126 6 Wireless Infrastructure Weidong Kou....... 127 6.1 Introduction..... 127 6.2 Wireless Communications Infrastructure... 128 6.3 Wireless Computing Infrastructure. 131 6.4 Wireless Application Protocol.... 134 6.5 Wireless Security.... 144 6.6 Summary..... 145 6.7 Appendix... 146 6.8 References...... 147 7 Payment Agents Amitabha Das......... 149 7.1 Introduction..... 149 7.2 Security Implications of Mobile-Agent-Based Systems. 151 7.3 Security Techniques Protecting Mobile Agents. 151 7.4 Secure Payment Protocols Using Mobile Agents in an Untrusted Host Environment....... 156 7.5 Summary...... 168 7.6 References.... 169

Table of Contents vii 8 Digital Cash Yi Mu, Vijay Varadharajan, and Khanh Quoc Nguyen.... 171 8.1 Introduction... 171 8.2 Security Requirements for Digital Cash.... 172 8.3 Brands Digital-Cash Scheme.. 173 8.4 One-Response Digital Cash.. 175 8.5 Fair Digital Cash... 181 8.6 Summary... 189 8.7 Appendix.... 189 8.8 References.... 192 9 Digital Checks Bo Yang..... 195 9.1 Introduction..... 195 9.2 Digital Check Concept.... 195 9.3 NetBill.. 199 9.4 NetCheque System... 207 9.5 Summary...... 209 9.6 References.... 209 10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew.... 211 10.1 Introduction... 211 10.2 Protocol Stack and Capabilities.... 212 10.3 SET Overview.. 215 10.4 SET Performance.. 223 10.5 What Lies Ahead...... 225 10.6 Summary... 225 10.7 References..... 226 11 Credit Card-Based Secure Online Payment Johnny Wong, Lev Mirlas, Weidong Kou, and Xiaodong Lin.... 227 11.1 Introduction... 227 11.2 Online Payment by Credit Card..... 228

viii Table of Contents 11.3 Trust Problems in Credit Card Payments.... 230 11.4 Trusted Third Party and a Payment Protocol Using a Trusted Third Party........ 233 11.5 Summary..... 238 11.6 Appendices.... 238 11.7 References...... 243 12 Micropayments Amir Herzberg....... 245 12.1 Introduction..... 245 12.2 Overview of Micropayment Systems... 246 12.3 Cost Factors for Online Payments.. 250 12.4 Disputes and Chargebacks..... 252 12.5 Customer Acquiring and Support Costs..... 262 12.6 Equipment, Processing, and Communication Costs..... 273 12.7 Summary..... 279 12.8 References....... 280 13 Industrial E-Payment Systems and Solutions Zheng Huang, Dong Zheng, Zichen Li, and Weidong Kou..... 283 13.1 Introduction..... 283 13.2 Visa Cash... 283 13.3 ipin E-Payment.. 289 13.4 PayPal..... 294 13.5 Summary..... 298 13.6 References....... 299 14 Challenges and Opportunities in E-Payment Weidong Kou... 301 14.1 E-Commerce Challenges: E-Payment Security and Privacy.. 301 14.2 E-Payment Systems Supporting Multiple Payment Methods. 302 14.3 Smart Cards and Digital Cash..... 304 14.4 Micropayment Issues and Solutions... 305 14.5 Summary..... 306 14.6 References....... 306

Table of Contents ix Glossary.......... 309 About the Editor......... 323 Contributors........... 325 Index.......... 331