Protocols for Secure Electronic Commerce / Edition 2

Hardcover (Print)
Buy New
Buy New from
Used and New from Other Sellers
Used and New from Other Sellers
from $6.20
Usually ships in 1-2 business days
(Save 96%)
Other sellers (Hardcover)
  • All (8) from $6.20   
  • New (3) from $65.03   
  • Used (5) from $6.20   


The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes. Protocols for Secure Electronic Commerce, Second Edition addresses the security portion of this challenge. It is a full compendium of the protocols for securing online commerce and payments, serving as an invaluable resource for students and professionals in the fields of computer science and engineering, IT security, and financial and banking technology. The initial sections provide a broad overview of electronic commerce, money, payment systems, and business-to-business commerce, followed by an examination of well-known protocols (SSL, TLS, WTLS, and SET). The book also explores encryption algorithms and methods, EDI, micropayment, and multiple aspects of digital money. Like its predecessor, this edition is a general analysis that provides many references to more technical resources. It delivers extensive revisions of previous chapters, along with new chapters on electronic commerce in society, new e-commerce systems, and the security of integrated circuit cards.

Read More Show Less

Product Details

Table of Contents

Overview of Electronic Commerce
What Is Electronic Commerce?
Categories of Electronic Commerce
The Influence of the Internet
Infrastructure for Electronic Commerce
Network Access
Consequences of E-commerce
Money and Payment Systems
The Mechanisms of Classical Money
Instruments of Payment
Types of Dematerialized Monies
Purses and Holders
Transactional Properties of Dematerialized Currencies
Overall Comparison of the Means of Payment
The Practice of Dematerialized Money
Banking Clearance and Settlement
Algorithms and Architectures for Security
Security of Commercial Transactions
Security of Open Financial Networks
Security Objectives
OSI Model for Cryptographic Security
Security Services at the Link Layer
Security Services at the Network Layer
Security Services at the Application Layer
Message Confidentiality
Data Integrity
Identification of the Participants
Authentication of the Participants
Access Control
Denial of Service
Secure Management of Cryptographic Keys
Exchange of Secret Keys: Kerberos
Public Key Kerberos
Exchange of Public Keys
ISAKMP (Internet Security Association and Key Management Protocol)
SKIP (Simple Key Management for Internet Protocols)
Key Exchange Algorithm
Certificate Management
Encryption Cracks
Appendix I: Principles of Symmetric Encryption
Appendix II: Principles of Public Key Encryption
Appendix III: Principles of the Digital Signature Algorithm
Appendix IV: Comparative Data
Business-to-Business Commerce
Overview of Business-to-Business Commerce
Examples of Business-to-Business Electronic Commerce
Business-to-Business Electronic Commerce Platforms
Obstacles Facing Business-to-Business Electronic Commerce
Business-to-Business Electronic Commerce Systems
Structured Alphanumeric Data
Structured Documents or Forms
EDI Messaging
Security of EDI
Relation of EDI with Electronic Funds Transfer
Electronic Billing
EDI Integration with Business Processes
Standardization of the Exchanges of Business-to-Business
Electronic Commerce
SSL (Secure Sockets Layer)
General Presentation of the SSL Protocol
SSL Subprotocols
Example of SSL Processing
Performance Acceleration
Appendix 5.1: Structures of the Handshake Messages
TLS (Transport Layer Security) and WTLS (Wireless Transport
Layer Security)
From SSL to TLS
The SET Protocol
SET Architecture
Security Services of SET
Purchasing Transaction
Optional Procedures in SET
SET Implementations
Composite Solutions
C-SET and Cyber-COMM
Hybrid SSL/SET Architecture
3-D Secure
Payments with CD-ROM
Micropayments and Face-to-Face Commerce
Characteristics of Micropayment Systems
Potential Applications
Harmonization of Electronic Purses
Remote Micropayments
Security with out Encryption: First Virtual
Comparison of the Different First-Generation Remote Micropayment Systems
Second-Generation Systems
Digital Money
Building Blocks
DigiCash (Ecash)
Dematerialized Checks
Classical Processing of Paper Checks
Dematerialized Processing of Paper-Based Checks
Bank Internet Payment System (BIPS)
Comparison of Virtual Checks with Bankcards
Security of Integrated Circuit Cards
Description of Integrated Circuit Cards
Standards for Integrated Circuit Cards
Security of Microprocessor Cards
Multiapplication Smart Cards
Integration of Smart Cards with Computer Systems
Limits on Security
Systems of Electronic Commerce
PICS and P3P
Analysis of User Behavior
Fidelity Cards
Quality of Service Considerations
Electronic Commerce in Society
Communication Infrastructure
Harmonization and Standardization
Issuance of Electronic Money
Protection of Intellectual Property
Electronic Surveillance and Privacy
Filtering and Censorship
Taxation of Electronic Commerce
Fraud Prevention
Archives Dematerialization
Web Sites
Integration XML/EDIFACT
Smart (Microprocessor) Cards
Electronic and Virtual Checks
Labeling Organizations

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)