[go: up one dir, main page]

Graff, 2000 - Google Patents

Cryptography and E-commerce

Graff, 2000

Document ID
7304051622841969692
Author
Graff J
Publication year

External Links

Snippet

From the Publisher: A clear and easy guide on how to use cryptography to secure e- commerce transactions To be on the cutting edge of e-commerce, you need to understand how to best utilize cryptography to offer secure services for your customers over the Internet …
Continue reading at dl.acm.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party

Similar Documents

Publication Publication Date Title
Simmons Contemporary cryptology: The science of information integrity
Nichols ICSA guide to cryptography
Schneier Schneier's Cryptography Classics Library: Applied Cryptography, Secrets and Lies, and Practical Cryptography
Nash et al. PKI: Implementing and Managing E-security
Atreya et al. Digital signatures
Graff Cryptography and E-commerce
Brands Secret-key certificates
Denning International encryption policy
Simovits The Des: An Extensive Documentation and Evaluation of the Data Encryption Standard
Abbruscato Data encryption equipment
Denning Encryption policy and market trends
Stallings Practical Cryptography for Data Internetworks
Brown Analysis of the DES and the Design of the LOKI Encryption Scheme
Omura A computer dial access system based on public-key techniques
Worley Insecurity of the knapsack one-time pad
Brands A note on parallel executions of restrictive blind issuing protocols for secret-key certificates
Chow Functional credentials for internet of things
Mavrogiannopoulos RFC 8479: Storing Validation Parameters in PKCS# 8
Brands Secret-key certificates (Continued)
Harris Encryption—Export Control Reform
Imai et al. Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Kar A Novel Construction of Aggregate Signcryption Scheme for Smart Card
Sobel Comments on draft export criteria for key escrow encryption
Cramer On shared randomness and the size of secure signatures
Geetha et al. Secured Communication mechanism in Public Key Cryptography