Cryptographic solutions for secure online banking and commerce
This book discusses the challenges of providing security for online applications and transactions, highlighting research on digital signatures, public key infrastructure, encryption algorithms, and digital certificates, as well as other e-commerce protocols
Saved in:
| Other Authors: | Balasubramanian, Kannan 1968- (Editor), Mala, K. (Editor), Rajakani, M. (Editor) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hershey, PA
Information Science Reference, an imprint of IGI Global
[2016]
|
| Series: | Advances in systems analysis, software engineering, and high performance computing (ASASEHPC)
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Call Number : | HG 1710 .C786 2016 |
Similar Items
Blockchain blueprint for a new economy
by: Swan, Melanie
Published: (2015)
by: Swan, Melanie
Published: (2015)
Bitcoin and cryptocurrency technologies a comprehensive introduction
by: Narayanan, Arvind
Published: (2016)
by: Narayanan, Arvind
Published: (2016)
mCommerce security a beginner's guide
by: RainalhKapil
by: RainalhKapil
Hacking point of sale payment application secrets, threats, and solutions
by: Gomzin, Slava
Published: (2014)
by: Gomzin, Slava
Published: (2014)
Web technologies for commerce and services online
Published: (2008)
Published: (2008)
E-commerce security
by: Ghosh
Published: (1998)
by: Ghosh
Published: (1998)
Internet commerce
by: Lesnick lhLeslie
by: Lesnick lhLeslie
Electronic commerce relationships trust by design
by: lh
by: lh
Securing information and communications systems principles, technologies, and applications
Published: (2008)
Published: (2008)
Cryptographic security solutions for the Internet of Things
Published: (2019)
Published: (2019)
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
7A Security's official guide cryptography
by: Burnett
Published: (2001)
by: Burnett
Published: (2001)
Handbook of research on modern cryptographic solutions for computer and cyber security
Published: (2016)
Published: (2016)
Multimedia forensics and security
Published: (2009)
Published: (2009)
A cyber exercise post assessment framework in Malaysia perspective
by: Arniyati Ahmad
Published: (2016)
by: Arniyati Ahmad
Published: (2016)
Citizen-centric privacy requirements engineering framework
by: Nor Asiakin Hasbullah
Published: (2017)
by: Nor Asiakin Hasbullah
Published: (2017)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2011)
by: Stallings, William
Published: (2011)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Cryptography and network security principles and practices
by: Stallings
Published: (2003)
by: Stallings
Published: (2003)
Cryptography and network security principles and practice
by: Stallings
Published: (1998)
by: Stallings
Published: (1998)
Web 2.0 security defending Ajax, RIA, and SOA
by: Shah, Shreeraj
Published: (2008)
by: Shah, Shreeraj
Published: (2008)
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015)
by: Boyle, Randall, et al.
Published: (2015)
Corporate computer and network security
by: Panko, R. R.
Published: (2010)
by: Panko, R. R.
Published: (2010)
Corporate computer and network security
by: Panko lhRaymond R
by: Panko lhRaymond R
Multimedia content encryption techniques and applications
by: Lian, Shiguo
Published: (2009)
by: Lian, Shiguo
Published: (2009)
CRYPTOGRAPHY AND NETWORK SECURITY : PRINCIPLES AND PRACTICE /
by: Stallings, William
Published: (2023)
by: Stallings, William
Published: (2023)
Writing secure code
by: Howard, Michael 1965-
Published: (2003)
by: Howard, Michael 1965-
Published: (2003)
Applications of secure multiparty computation
Published: (2015)
Published: (2015)
Computer security handbook
Published: (2014)
Published: (2014)
Security in distributed computing Did you lock the Door?
by: Bruce
Published: (1997)
by: Bruce
Published: (1997)
B2b and beyond new business models built on trust
by: DcMaio, Harry B.
Published: (2001)
by: DcMaio, Harry B.
Published: (2001)
Similar Items
-
Blockchain blueprint for a new economy
by: Swan, Melanie
Published: (2015) -
Bitcoin and cryptocurrency technologies a comprehensive introduction
by: Narayanan, Arvind
Published: (2016) -
mCommerce security a beginner's guide
by: RainalhKapil -
Hacking point of sale payment application secrets, threats, and solutions
by: Gomzin, Slava
Published: (2014) -
Web technologies for commerce and services online
Published: (2008)


