Secure Transaction Protocol Analysis

UTSePress Research/Manakin Repository

Search UTSePress Research


Advanced Search

Browse

My Account

Show simple item record

dc.contributor.author Chen, Qingfeng en_US
dc.contributor.author Zhang, Chengqi en_US
dc.contributor.author Zhang, Shichao en_US
dc.contributor.editor en_US
dc.date.accessioned 2010-05-28T09:36:39Z
dc.date.available 2010-05-28T09:36:39Z
dc.date.issued 2008 en_US
dc.identifier 2008001397 en_US
dc.identifier.citation Chen Qingfeng, Zhang Chengqi and Zhang Shichao 2008, 'Secure Transaction Protocol Analysis',Springer-Verlag, Berlin, Germany en_US
dc.identifier.issn 978-3-540-85073-1 en_US
dc.identifier.other A1 en_US
dc.identifier.uri http://hdl.handle.net/10453/7766
dc.description.abstract Security protocols (cryptographic protocol) have been widely used to not only achieve traditional goals of data confidentiality, integrity and authentication, but also secure a variety of other desired characteristics of computer-mediated transactions recently. To guarantee reliable protocols, a great deal of formal methods has been undertaken not only to develop diverse tools with specialized purpose or general purpose, but also to apply them to the analysis of realistic protocols. Many of them have been proved to be useful in detecting some intuitive attacks in security protocols. In many cases, a useful feedback is supplied to designers in order to improve the protocola??s security. For both beginners and experienced researchers, this book will present useful information on relevant technologies that can be extended or adapted. A comprehensive introduction to the basic concepts and core techniques will be presented. In this chapter, we explain what is security protocols and how they can be used to ensure secure transactions, what challenging issues in e-commerce (electronic commerce) are, why security protocol analysis important, how they are performed, and what are the ongoing efforts and relevant work. We will also explain the limitations in previous work and why it is important to develop new approaches. These questions will be briefly answered. In particular, we will focus on the discussion regarding secure transaction protocols. Finally, some emerging issues and the ways they are being met are also described. en_US
dc.language en_US
dc.publisher Springer en_US
dc.relation.isbasedon http://dx.doi.org/10.1007/978-3-540-85074-8 en_US
dc.title Secure Transaction Protocol Analysis en_US
dc.parent en_US
dc.journal.volume en_US
dc.journal.number en_US
dc.publocation Berlin, Germany en_US
dc.identifier.startpage en_US
dc.identifier.endpage en_US
dc.cauo.name FEIT.School of Systems, Management and Leadership en_US
dc.conference Verified OK en_US
dc.for 080300 en_US
dc.personcode 117449 en_US
dc.personcode 011221 en_US
dc.personcode 020030 en_US
dc.percentage 100 en_US
dc.classification.name Distributed Computing en_US
dc.classification.type FOR-08 en_US
dc.edition 1 en_US
dc.custom en_US
dc.date.activity en_US
dc.location.activity en_US
dc.description.keywords Security protocols , data confidentiality, integrity and authentication. en_US
dc.staffid 020030 en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record