001447913 000__ 02840cam\a2200469Ia\4500 001447913 001__ 1447913 001447913 003__ OCoLC 001447913 005__ 20230310004142.0 001447913 006__ m\\\\\o\\d\\\\\\\\ 001447913 007__ cr\un\nnnunnun 001447913 008__ 220703s2022\\\\sz\\\\\\ob\\\\000\0\eng\d 001447913 020__ $$a9783030993511$$q(electronic bk.) 001447913 020__ $$a3030993515$$q(electronic bk.) 001447913 020__ $$z3030993507 001447913 020__ $$z9783030993504 001447913 0247_ $$a10.1007/978-3-030-99351-1$$2doi 001447913 035__ $$aSP(OCoLC)1334102623 001447913 040__ $$aYDX$$beng$$cYDX$$dGW5XE$$dEBLCP$$dOCLCF$$dOCLCQ 001447913 049__ $$aISEA 001447913 050_4 $$aHF5548.32 001447913 08204 $$a381/.142$$223/eng/20220707 001447913 1001_ $$aBîrjoveanu, Cătălin V.,$$eauthor. 001447913 24510 $$aSecure multi-party e-commerce protocols /$$cCătălin V. Bîrjoveanu, Mirela Bîrjoveanu. 001447913 260__ $$aCham, Switzerland :$$bSpringer,$$c2022. 001447913 300__ $$a1 online resource. 001447913 4901_ $$aSpringerBriefs in computer science 001447913 504__ $$aIncludes bibliographical references. 001447913 5050_ $$a1. Introduction -- 2. Two-Party E-Commerce Protocols -- 3. Multi-Party E-Commerce Protocols for Complex Transactions -- 4. E-Commerce Protocols for Multi-Chained Complex Transactions -- 5. Formal Verification of Multi-Party Fair Exchange E-Commerce Protocols -- 6. Conclusions. 001447913 506__ $$aAccess limited to authorized users. 001447913 520__ $$aThis book presents the state of the art for multi-party fair exchange protocols and provides insight details regarding multi-party applications for buying physical products. The authors tackle the fairness problem in e-commerce protocols for buying physical products in scenarios involving complex and chained transactions and provide use cases of these protocols for B2C and B2B scenarios. The book also includes the formal verification of the fair multi-party exchange e-commerce protocols using the Constraint-Logic-based Attack Searcher from AVISPA, a tool for the Automated Validation of Internet Security Protocols and Applications. This book is mainly targeted to researchers in e-commerce security, yet it shall be interesting as well for professional developers in e-commerce. They all are provided with an understanding of and a starting point for designing secure multi-party e-commerce protocols. 001447913 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed July 7, 2022). 001447913 650_0 $$aElectronic commerce$$xSecurity measures. 001447913 655_0 $$aElectronic books. 001447913 7001_ $$aBîrjoveanu, Mirela,$$eauthor. 001447913 77608 $$iPrint version: $$z3030993507$$z9783030993504$$w(OCoLC)1302575154 001447913 830_0 $$aSpringerBriefs in computer science. 001447913 852__ $$bebk 001447913 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-99351-1$$zOnline Access$$91397441.1 001447913 909CO $$ooai:library.usi.edu:1447913$$pGLOBAL_SET 001447913 980__ $$aBIB 001447913 980__ $$aEBOOK 001447913 982__ $$aEbook 001447913 983__ $$aOnline 001447913 994__ $$a92$$bISE