Secure Multi-Party Non-Repudiation Protocols and Applications

Secure Multi-Party Non-Repudiation Protocols and Applications
Title Secure Multi-Party Non-Repudiation Protocols and Applications PDF eBook
Author José A. Onieva
Publisher Springer Science & Business Media
Pages 193
Release 2008-10-31
Genre Computers
ISBN 0387756302

Download Secure Multi-Party Non-Repudiation Protocols and Applications Book in PDF, Epub and Kindle

The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. This book is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. The book is also suitable as an advanced-level text or reference book for students in computer science.

Secure Multi-Party E-Commerce Protocols

Secure Multi-Party E-Commerce Protocols
Title Secure Multi-Party E-Commerce Protocols PDF eBook
Author Cătălin V. Bîrjoveanu
Publisher Springer Nature
Pages 109
Release 2022-06-30
Genre Computers
ISBN 3030993515

Download Secure Multi-Party E-Commerce Protocols Book in PDF, Epub and Kindle

This book presents the state of the art for multi-party fair exchange protocols and provides insight details regarding multi-party applications for buying physical products. The authors tackle the fairness problem in e-commerce protocols for buying physical products in scenarios involving complex and chained transactions and provide use cases of these protocols for B2C and B2B scenarios. The book also includes the formal verification of the fair multi-party exchange e-commerce protocols using the Constraint-Logic-based Attack Searcher from AVISPA, a tool for the Automated Validation of Internet Security Protocols and Applications. This book is mainly targeted to researchers in e-commerce security, yet it shall be interesting as well for professional developers in e-commerce. They all are provided with an understanding of and a starting point for designing secure multi-party e-commerce protocols.

Handbook of Financial Cryptography and Security

Handbook of Financial Cryptography and Security
Title Handbook of Financial Cryptography and Security PDF eBook
Author Burton Rosenberg
Publisher CRC Press
Pages 631
Release 2010-08-02
Genre Computers
ISBN 1420059823

Download Handbook of Financial Cryptography and Security Book in PDF, Epub and Kindle

The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions, electronic voting, micropayment systems, digital rights, financial portfolios, routing

Cloud Computing for Enterprise Architectures

Cloud Computing for Enterprise Architectures
Title Cloud Computing for Enterprise Architectures PDF eBook
Author Zaigham Mahmood
Publisher Springer Science & Business Media
Pages 332
Release 2011-12-01
Genre Computers
ISBN 1447122364

Download Cloud Computing for Enterprise Architectures Book in PDF, Epub and Kindle

This important text provides a single point of reference for state-of-the-art cloud computing design and implementation techniques. The book examines cloud computing from the perspective of enterprise architecture, asking the question; how do we realize new business potential with our existing enterprises? Topics and features: with a Foreword by Thomas Erl; contains contributions from an international selection of preeminent experts; presents the state-of-the-art in enterprise architecture approaches with respect to cloud computing models, frameworks, technologies, and applications; discusses potential research directions, and technologies to facilitate the realization of emerging business models through enterprise architecture approaches; provides relevant theoretical frameworks, and the latest empirical research findings.

Mastering Blockchain

Mastering Blockchain
Title Mastering Blockchain PDF eBook
Author Imran Bashir
Publisher Packt Publishing Ltd
Pages 817
Release 2020-08-31
Genre Computers
ISBN 1839211377

Download Mastering Blockchain Book in PDF, Epub and Kindle

Develop a deeper understanding of what's under the hood of blockchain with this technical reference guide on one of the most disruptive modern technologies Key Features Updated with four new chapters on consensus algorithms, Ethereum 2.0, tokenization, and enterprise blockchains Learn about key elements of blockchain theory such as decentralization, cryptography, and consensus protocols Get to grips with Solidity, Web3, cryptocurrencies, smart contract development and solve scalability, security and privacy issues Discover the architecture of different distributed ledger platforms including Ethereum, Bitcoin, Hyperledger Fabric, Hyperledger Sawtooth, Corda and Quorum Book Description Blockchain is the backbone of cryptocurrencies, with applications in finance, government, media, and other industries. With a legacy of providing technologists with executable insights, this new edition of Mastering Blockchain is thoroughly revised and updated to the latest blockchain research with four new chapters on consensus algorithms, Serenity (the update that will introduce Ethereum 2.0), tokenization, and enterprise blockchains. This book covers the basics, including blockchain's technical underpinnings, cryptography and consensus protocols. It also provides you with expert knowledge on decentralization, decentralized application development on Ethereum, Bitcoin, alternative coins, smart contracts, alternative blockchains, and Hyperledger. Further, you will explore blockchain solutions beyond cryptocurrencies such as the Internet of Things with blockchain, enterprise blockchains, tokenization using blockchain, and consider the future scope of this fascinating and disruptive technology. By the end of this book, you will have gained a thorough comprehension of the various facets of blockchain and understand their potential in diverse real-world scenarios. What you will learn Grasp the mechanisms behind Bitcoin, Ethereum, and alternative cryptocurrencies Understand cryptography and its usage in blockchain Understand the theoretical foundations of smart contracts Develop decentralized applications using Solidity, Remix, Truffle, Ganache and Drizzle Identify and examine applications of blockchain beyond cryptocurrencies Understand the architecture and development of Ethereum 2.0 Explore research topics and the future scope of blockchain Who this book is for If you are a technologist, business executive, a student or an enthusiast who wishes to explore the fascinating world of blockchain technology, smart contracts, decentralized applications and distributed systems then this book is for you. Basic familiarity with a beginner-level command of a programming language would be a plus.

Architectures and Protocols for Secure Information Technology Infrastructures

Architectures and Protocols for Secure Information Technology Infrastructures
Title Architectures and Protocols for Secure Information Technology Infrastructures PDF eBook
Author Ruiz-Martinez, Antonio
Publisher IGI Global
Pages 427
Release 2013-09-30
Genre Computers
ISBN 1466645156

Download Architectures and Protocols for Secure Information Technology Infrastructures Book in PDF, Epub and Kindle

With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for researchers, engineers, and professionals interested in exploring recent advances in ICT security.

Computational Science and Its Applications - ICCSA 2007

Computational Science and Its Applications - ICCSA 2007
Title Computational Science and Its Applications - ICCSA 2007 PDF eBook
Author Osvaldo Gervasi
Publisher Springer
Pages 1152
Release 2007-08-29
Genre Computers
ISBN 3540744770

Download Computational Science and Its Applications - ICCSA 2007 Book in PDF, Epub and Kindle

This three-volume set constitutes the refereed proceedings of the International Conference on Computational Science and its Applications. These volumes feature outstanding papers that present a wealth of original research results in the field of computational science, from foundational issues in computer science and mathematics to advanced applications in almost all sciences that use computational techniques.