Applied Cryptography in Electronic Commerce

Author(s):  
Slawomir Grzonkowski ◽  
Brian D. Ensor ◽  
Bill McDaniel

Electronic commerce has grown into a vital segment of the economy of many nations. It is a global phenomenon providing markets and commercialization opportunities world-wide with a significantly reduced barrier to entry as compared to global marketing in the 20th century. Providing protocols to secure such commerce is critical and continues to be an area for both scientific and engineering study. Falsification, fraud, identity theft, and disinformation campaigns or other attacks could damage the credibility and value of electronic commerce if left unchecked. Consequently, cryptographic methods have emerged to combat any such efforts, be they the occasional random attempt at theft or highly organized criminal or political activities. This chapter covers the use of cryptographic methods and emerging standards in this area to provide the necessary protection. That protection, as is common for web-based protocols, evolves over time to deal with more and more sophisticated attacks. At the same time, the provision of security in a manner convenient enough to not deter electronic commerce has driven research efforts to find easier to use and simpler protocols to implement even as the strength of the cryptographic methods has increased. This chapter covers current standards, looking at several facets of the secure commercialization problem from authentication to intrusion detection and identity and reputation management. Vulnerabilities are discussed as well as capabilities.

2013 ◽  
pp. 368-388
Author(s):  
Slawomir Grzonkowski ◽  
Brian D. Ensor ◽  
Bill McDaniel

Electronic commerce has grown into a vital segment of the economy of many nations. It is a global phenomenon providing markets and commercialization opportunities world-wide with a significantly reduced barrier to entry as compared to global marketing in the 20th century. Providing protocols to secure such commerce is critical and continues to be an area for both scientific and engineering study. Falsification, fraud, identity theft, and disinformation campaigns or other attacks could damage the credibility and value of electronic commerce if left unchecked. Consequently, cryptographic methods have emerged to combat any such efforts, be they the occasional random attempt at theft or highly organized criminal or political activities. This chapter covers the use of cryptographic methods and emerging standards in this area to provide the necessary protection. That protection, as is common for web-based protocols, evolves over time to deal with more and more sophisticated attacks. At the same time, the provision of security in a manner convenient enough to not deter electronic commerce has driven research efforts to find easier to use and simpler protocols to implement even as the strength of the cryptographic methods has increased. This chapter covers current standards, looking at several facets of the secure commercialization problem from authentication to intrusion detection and identity and reputation management. Vulnerabilities are discussed as well as capabilities.


2018 ◽  
Vol 33 (3) ◽  
pp. 473-484 ◽  
Author(s):  
Lorna Paul ◽  
Linda Renfrew ◽  
Jennifer Freeman ◽  
Heather Murray ◽  
Belinda Weller ◽  
...  

Objective: To examine the feasibility of a trial to evaluate web-based physiotherapy compared to a standard home exercise programme in people with multiple sclerosis. Design: Multi-centre, randomized controlled, feasibility study. Setting: Three multiple sclerosis out-patient centres. Participants: A total of 90 people with multiple sclerosis (Expanded Disability Status Scale 4–6.5). Interventions: Participants were randomized to a six-month individualized, home exercise programme delivered via web-based physiotherapy ( n = 45; intervention) or a sheet of exercises ( n = 45; active comparator). Outcome measures: Outcome measures (0, three, six and nine months) included adherence, two-minute walk test, 25 foot walk, Berg Balance Scale, physical activity and healthcare resource use. Interviews were undertaken with 24 participants and 3 physiotherapists. Results: Almost 25% of people approached agreed to take part. No intervention-related adverse events were recorded. Adherence was 40%–63% and 53%–71% in the intervention and comparator groups. There was no difference in the two-minute walk test between groups at baseline (Intervention-80.4(33.91)m, Comparator-70.6(31.20)m) and no change over time (at six-month Intervention-81.6(32.75)m, Comparator-74.8(36.16)m. There were no significant changes over time in other outcome measures except the EuroQol-5 Dimension at six months which decreased in the active comparator group. For a difference of 8(17.4)m in two-minute walk test between groups, 76 participants/group would be required (80% power, P > 0.05) for a future randomized controlled trial. Conclusion: No changes were found in the majority of outcome measures over time. This study was acceptable and feasible by participants and physiotherapists. An adequately powered study needs 160 participants.


1998 ◽  
Vol 21 (3) ◽  
pp. 163-185 ◽  
Author(s):  
Johnny S.K. Wong ◽  
Rishi Nayar ◽  
Armin R. Mikler

2021 ◽  
Vol 1 (2) ◽  
Author(s):  
Siti Nurjanah Ramadhany ◽  
Ade Eviyanti

Technology is increasingly sophisticated with over time competition in the business world such as E-Commerce has a positive impact on entrepreneurs to advance their companies, namely by creating online websites so that offerings and sales are easy among the public. By accessing the website page of PT. Daya Berkah Sentosa Nusantara buyers do not have to come directly to the place or company, and send offers according to admin needs.The purpose of this study is to make it easier for researchers to solve supply and sales problems based on problems that arise in the company. The method used in this study is the Waterfall Method, with data collection techniques used using observation, interviews and literature study. The desired result of this research is to be able to create a website for the company, to be able to expand marketing reach, buyers can view products through the website.


2004 ◽  
Vol 10 (1) ◽  
pp. 3-6
Author(s):  
Aistė Mickaityte

In the cause of world‐wide integration and on constant increase of the number of inhabitants in the cities that extend their territories, the urban development problems become a relevant issue. Sustainable urban development covers a number of activity fields ‐ sustainable planning of land handling, city renovation, sustainable buildings, rational power consumption, sustainable transport, distribution of pollution and shape of a city. The development of all the mentioned processes could be simplified by using information technologies that simplify and facilitate the work performed by specialists; improve its quality and results. Aims and principles of sustainable urban development, also the possibilities of usage of Internet medium - calculators, software, and decision support system ‐ are defined in the presented article.


1997 ◽  
Author(s):  
Srihari Sampath-Kumar ◽  
Anindo Banerjea ◽  
Mehran Moshfeghi
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document