Applied Cryptography in Electronic Commerce

Applied Cryptography in Electronic Commerce

Slawomir Grzonkowski, Brian D. Ensor, Bill McDaniel
ISBN13: 9781615207831|ISBN10: 161520783X|EISBN13: 9781615207848
DOI: 10.4018/978-1-61520-783-1.ch008
Cite Chapter Cite Chapter

MLA

Grzonkowski, Slawomir, et al. "Applied Cryptography in Electronic Commerce." Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, edited by Hamid R. Nemati and Li Yang, IGI Global, 2011, pp. 180-200. https://doi.org/10.4018/978-1-61520-783-1.ch008

APA

Grzonkowski, S., Ensor, B. D., & McDaniel, B. (2011). Applied Cryptography in Electronic Commerce. In H. Nemati & L. Yang (Eds.), Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering (pp. 180-200). IGI Global. https://doi.org/10.4018/978-1-61520-783-1.ch008

Chicago

Grzonkowski, Slawomir, Brian D. Ensor, and Bill McDaniel. "Applied Cryptography in Electronic Commerce." In Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, edited by Hamid R. Nemati and Li Yang, 180-200. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-61520-783-1.ch008

Export Reference

Mendeley
Favorite

Abstract

Electronic commerce has grown into a vital segment of the economy of many nations. It is a global phenomenon providing markets and commercialization opportunities world-wide with a significantly reduced barrier to entry as compared to global marketing in the 20th century. Providing protocols to secure such commerce is critical and continues to be an area for both scientific and engineering study. Falsification, fraud, identity theft, and disinformation campaigns or other attacks could damage the credibility and value of electronic commerce if left unchecked. Consequently, cryptographic methods have emerged to combat any such efforts, be they the occasional random attempt at theft or highly organized criminal or political activities. This chapter covers the use of cryptographic methods and emerging standards in this area to provide the necessary protection. That protection, as is common for web-based protocols, evolves over time to deal with more and more sophisticated attacks. At the same time, the provision of security in a manner convenient enough to not deter electronic commerce has driven research efforts to find easier to use and simpler protocols to implement even as the strength of the cryptographic methods has increased. This chapter covers current standards, looking at several facets of the secure commercialization problem from authentication to intrusion detection and identity and reputation management. Vulnerabilities are discussed as well as capabilities.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.