did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781580532686

Electronic Payment Systems for E-Commerce

by ; ;
  • ISBN13:

    9781580532686

  • ISBN10:

    1580532683

  • Edition: 2nd
  • Format: Hardcover
  • Copyright: 2001-08-01
  • Publisher: Artech House on Demand
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $114.00

Summary

Look to this newly revised resource for an up-to-date, in-depth examination of how payments are made electronically across the Internet. The second edition covers the very latest developments in this quickly expanding area, including new security techniques such as the advanced encryption standard (AES) and multi-application smart cards.

Author Biography

Donal O'Mahony is a senior lecturer in computer science at Trinity College in Dublin, Ireland Michael Peirce is a research student at Trinity College, where he recently received his Ph.D. in computer science Hitesh Tewari is a lecturer in computer science at Trinity College

Table of Contents

Preface xiii
Motivation for electronic payment
1(4)
References
4(1)
Characteristics of current payment systems
5(14)
Cash payments
6(1)
Payment through banks
7(5)
Payment by check
7(2)
Payment by giro or credit transfer
9(1)
Automated clearing house (ACH) payments
9(2)
Wire transfer services
11(1)
Using payment cards
12(2)
Consumer preferences in payment systems
14(1)
Regulatory framework
15(2)
References
17(2)
Cryptographic techniques
19(54)
Encryption and decryption
20(1)
Symmetric encryption
21(12)
Data Encryption Standard (DES)
22(4)
Triple DES
26(1)
IDEA
26(2)
Advanced Encryption Standard (AES)
28(2)
RC2, RC4, and RC5
30(3)
Message digesting or hashing
33(2)
MD5
34(1)
The Secure Hash Algorithm (SHA)
34(1)
Kerberos
35(3)
Overview of the Kerberos model
35(2)
Obtaining a ticket
37(1)
Service request
38(1)
Asymmetric or public-key encryption
38(2)
Properties of a public-key cryptosystem
39(1)
Trapdoor one-way functions
40(1)
Using public-key cryptosystems for authentication
40(1)
Digital signatures and enveloping
40(2)
RSA
42(2)
Elliptic curve cryptography
44(1)
Public-key infrastructure (PKI)
45(3)
Certificates
45(1)
Certification authorities
46(1)
Attribute certificates
47(1)
Transport of security information
48(6)
Abstract syntax notation (ASN.1)
49(2)
The X.509 directory authentication framework
51(2)
PKCS cryptographic message syntax
53(1)
Dual signatures
54(2)
Nonces
56(1)
Blind signatures
57(2)
Chip cards/smart cards
59(14)
Card types
60(1)
Memory types and capacity
61(2)
Physical specifications
63(1)
Security
63(1)
Public-key processing capabilities
64(1)
Multiapplication cards
65(1)
Java Card
65(2)
MULTOS
67(1)
Observers
68(1)
References
69(4)
Credit card-based systems
73(54)
Mail order/telephone order (MOTO) transactions
76(1)
Unsecured network payments
76(1)
First Virtual
77(3)
Once-off credit card numbers
80(2)
The secure socket layer (SSL)
82(7)
i-Key protocol (iKP)
89(11)
Framework of iKP protocols
90(1)
IKP
91(5)
2KP
96(2)
3KP
98(2)
Secure Electronic Transactions (SET)
100(23)
The SET trust model
102(3)
SET message structure
105(1)
Payment initialization (PInitReq/PInitRes)
106(1)
Purchase order (PReq/PRes)
107(5)
Authorization (AuthReq/AuthRes)
112(2)
Capture of payment (CapReq/CapRes)
114(1)
Cardholder inquiry (InqReq/InqRes)
115(5)
SET software components
120(1)
SET market acceptance
120(2)
Server-side wallets
122(1)
Using SET with smart cards
123(1)
Summary
123(4)
References
125(2)
Electronic checks and account transfers
127(44)
Payment transfer between centralized accounts
128(10)
Funding the account
130(4)
Authenticated account transfer
134(3)
Withdrawing funds from the system
137(1)
Business models
137(1)
FSTC payment initiatives
138(15)
Electronic check concept
139(2)
Financial Services Markup Language (FSML)
141(3)
Electronic check functional flows
144(2)
Check-handling infrastructure
146(2)
Bank Internet Payment System (BIPS)
148(3)
Financial Agent Secure Transaction (FAST)
151(2)
NACHA Internet payments
153(3)
Internet Secure ATM Payments (ISAP)
153(2)
DirectPay
155(1)
NetBill
156(8)
Protocol overview
157(2)
Authentication procedure
159(1)
Transaction protocol
160(1)
Price request phase
161(1)
Goods delivery phase
161(1)
Payment phase
162(1)
NetBill characteristics
163(1)
NetCheque
164(3)
Summary
167(4)
References
167(4)
Electronic cash payment systems
171(56)
Ecash
172(14)
The Ecash model
173(1)
Ecash coins
174(1)
Coin keys
174(3)
Double-spending prevention
177(1)
Withdrawing coins
178(2)
An Ecash purchase
180(1)
Making the payment
180(1)
Proving payment
181(1)
Payment deposit
182(1)
Integration with the Web
182(1)
Ecash in the mail
183(1)
Transferring Ecash
183(1)
Lost coins
184(1)
Ecash and crime
184(2)
Magic Money
186(1)
Remarks
186(1)
Project CAFE
186(10)
Goals of CAFE
187(1)
Architecture
188(1)
CAFE devices
189(1)
Role of observers
190(1)
Protocol overview
190(1)
Off-line coins
191(1)
The α protocol
192(3)
The γ protocol
195(1)
Additional features
196(1)
Remarks
196(1)
NetCash
196(14)
Framework/model
197(1)
NetCash coins
198(1)
Double-spending prevention
199(1)
Coin transfer
200(1)
Certificate of insurance
200(1)
Basic purchase
201(1)
Obtaining coins
201(2)
Paying a merchant
203(1)
Verifying coins
204(1)
Providing limited anonymity
204(1)
Merchant anonymity
205(1)
Preventing anonymity
206(1)
Clearing
206(1)
Extensions
207(1)
Preventing merchant fraud
207(2)
Off-line protocols
209(1)
Remarks
210(1)
Mondex
210(3)
EMV cash cards and CEPS
213(7)
EMV2000
214(1)
Common Electronic Purse Specification (CEPS)
214(6)
Remarks
220(1)
SmartAxis
220(2)
Remarks
222(5)
References
223(4)
Micropayment systems
227(76)
Millicent
228(17)
The Millicent model
229(2)
Purchasing with Millicent
231(2)
Scrip
233(1)
Scrip structure
234(1)
Scrip certificate generation
235(1)
Scrip validation
235(2)
Preventing double spending
237(1)
Computation costs
237(1)
Sending scrip over a network: the Millicent protocols
237(1)
Scrip in the clear
237(1)
Encrypted network connection
237(4)
Request signatures
241(2)
Performance
243(1)
Millicent with the Web
243(1)
Extensions
244(1)
Summary
245(1)
SubScrip
245(5)
Basic SubScrip
246(1)
Establishing a temporary account
246(1)
Providing anonymity
247(1)
A SubScrip ticket
247(1)
A SubScrip purchase
248(1)
Security and privacy
248(1)
Protected SubScrip
249(1)
Refunding SubScrip
250(1)
Lost tickets
250(1)
PayWord
250(9)
PayWord user certificates
251(2)
Revoked certificates
253(1)
PayWord chains
253(1)
Commitment to a PayWord chain
254(1)
Spending PayWords
255(1)
Variable-size payments
256(1)
Redeeming spent PayWords
257(1)
Computational costs
257(1)
Extensions
258(1)
Remarks
258(1)
iKP micropayment protocol
259(7)
μ-3KP protocol
260(1)
Repeated micropayments
261(3)
Nonrepeated micropayments
264(2)
Remarks
266(1)
Hash chain trees
266(7)
PayTree
268(2)
Unbalanced One-way Binary Tree (UOBT)
270(3)
MicroMint
273(10)
The MicroMint model
274(1)
MicroMint coins
274(1)
Verifying a coin
275(1)
Minting coins
276(1)
Computational costs
277(1)
Multiple coins per bin
278(1)
Coin validity criterion
278(1)
Preventing forgery
279(1)
A MicroMint purchase
280(1)
Double spending
280(1)
Extensions
281(2)
Probability-based micropayments
283(5)
Bets using coin flips
284(2)
Hash chain lottery tickets
286(2)
Jalda
288(4)
NewGenPay/IBM Micropayments
292(4)
Banner advertising as a form of micropayment
296(1)
Micropayments summary and analysis
297(6)
References
300(3)
Mobile commerce
303(22)
Mobile Internet architectures
305(3)
Carrying Internet data on cellular networks
305(1)
The wireless application protocol (WAP)
306(1)
Japan's iMode service
307(1)
Industry consortia
308(1)
Mobile network operator as banker
308(1)
Third-party account-based mobile payment systems
309(7)
Sonera MobilePay
310(1)
Paybox
311(2)
GiSMo
313(2)
The Fundamo architecture
315(1)
Credit card-based systems
316(5)
Mobile SET
317(3)
Remarks
320(1)
Summary
321(4)
References
322(3)
Payment systems: prospects for the future
325(4)
About the authors 329(2)
Index 331

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program