Graff, 2000 - Google Patents
Cryptography and E-commerceGraff, 2000
- Document ID
- 7304051622841969692
- Author
- Graff J
- Publication year
External Links
Snippet
From the Publisher: A clear and easy guide on how to use cryptography to secure e- commerce transactions To be on the cutting edge of e-commerce, you need to understand how to best utilize cryptography to offer secure services for your customers over the Internet …
- 238000000034 method 0 description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Simmons | Contemporary cryptology: The science of information integrity | |
Nichols | ICSA guide to cryptography | |
Schneier | Schneier's Cryptography Classics Library: Applied Cryptography, Secrets and Lies, and Practical Cryptography | |
Nash et al. | PKI: Implementing and Managing E-security | |
Atreya et al. | Digital signatures | |
Graff | Cryptography and E-commerce | |
Brands | Secret-key certificates | |
Denning | International encryption policy | |
Simovits | The Des: An Extensive Documentation and Evaluation of the Data Encryption Standard | |
Abbruscato | Data encryption equipment | |
Denning | Encryption policy and market trends | |
Stallings | Practical Cryptography for Data Internetworks | |
Brown | Analysis of the DES and the Design of the LOKI Encryption Scheme | |
Omura | A computer dial access system based on public-key techniques | |
Worley | Insecurity of the knapsack one-time pad | |
Brands | A note on parallel executions of restrictive blind issuing protocols for secret-key certificates | |
Chow | Functional credentials for internet of things | |
Mavrogiannopoulos | RFC 8479: Storing Validation Parameters in PKCS# 8 | |
Brands | Secret-key certificates (Continued) | |
Harris | Encryption—Export Control Reform | |
Imai et al. | Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography | |
Kar | A Novel Construction of Aggregate Signcryption Scheme for Smart Card | |
Sobel | Comments on draft export criteria for key escrow encryption | |
Cramer | On shared randomness and the size of secure signatures | |
Geetha et al. | Secured Communication mechanism in Public Key Cryptography |