Secure Multi-Party Non-Repudiation Protocols and Applications

Secure Multi-Party Non-Repudiation Protocols and Applications

Author: José A. Onieva

Publisher: Springer Science & Business Media

Published: 2008-10-31

Total Pages: 193

ISBN-13: 0387756302

DOWNLOAD EBOOK

The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. This book is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. The book is also suitable as an advanced-level text or reference book for students in computer science.


Secure Multi-party Computation

Secure Multi-party Computation

Author: Manoj Prabhakaran

Publisher: IOS Press

Published: 2013

Total Pages: 296

ISBN-13: 1614991685

DOWNLOAD EBOOK

Secure Multi-Party Computation MPC is one of the most powerful tools developed by modern cryptography it facilitates collaboration among mutually distrusting parties by implementing a virtual trusted party. Despite the remarkable potential of such a tool, and decades of active research in the theoretical cryptography community, it remains a relatively inaccessible and lesser-known concept outside of this field. Only a handful of resources are available to students and researchers wishing to learn more about MPC. The editors of this book have assembled a comprehensive body of basic and advanced material on MPC, authored by


Secure Multi-Party E-Commerce Protocols

Secure Multi-Party E-Commerce Protocols

Author: Cătălin V. Bîrjoveanu

Publisher: Springer Nature

Published: 2022-06-30

Total Pages: 109

ISBN-13: 3030993515

DOWNLOAD EBOOK

This book presents the state of the art for multi-party fair exchange protocols and provides insight details regarding multi-party applications for buying physical products. The authors tackle the fairness problem in e-commerce protocols for buying physical products in scenarios involving complex and chained transactions and provide use cases of these protocols for B2C and B2B scenarios. The book also includes the formal verification of the fair multi-party exchange e-commerce protocols using the Constraint-Logic-based Attack Searcher from AVISPA, a tool for the Automated Validation of Internet Security Protocols and Applications. This book is mainly targeted to researchers in e-commerce security, yet it shall be interesting as well for professional developers in e-commerce. They all are provided with an understanding of and a starting point for designing secure multi-party e-commerce protocols.


Handbook of Financial Cryptography and Security

Handbook of Financial Cryptography and Security

Author: Burton Rosenberg

Publisher: CRC Press

Published: 2010-08-02

Total Pages: 631

ISBN-13: 1420059823

DOWNLOAD EBOOK

The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions, electronic voting, micropayment systems, digital rights, financial portfolios, routing


Cloud Computing for Enterprise Architectures

Cloud Computing for Enterprise Architectures

Author: Zaigham Mahmood

Publisher: Springer Science & Business Media

Published: 2011-12-01

Total Pages: 332

ISBN-13: 1447122364

DOWNLOAD EBOOK

This important text provides a single point of reference for state-of-the-art cloud computing design and implementation techniques. The book examines cloud computing from the perspective of enterprise architecture, asking the question; how do we realize new business potential with our existing enterprises? Topics and features: with a Foreword by Thomas Erl; contains contributions from an international selection of preeminent experts; presents the state-of-the-art in enterprise architecture approaches with respect to cloud computing models, frameworks, technologies, and applications; discusses potential research directions, and technologies to facilitate the realization of emerging business models through enterprise architecture approaches; provides relevant theoretical frameworks, and the latest empirical research findings.


Mastering Blockchain

Mastering Blockchain

Author: Imran Bashir

Publisher: Packt Publishing Ltd

Published: 2020-08-31

Total Pages: 817

ISBN-13: 1839211377

DOWNLOAD EBOOK

Develop a deeper understanding of what's under the hood of blockchain with this technical reference guide on one of the most disruptive modern technologies Key Features Updated with four new chapters on consensus algorithms, Ethereum 2.0, tokenization, and enterprise blockchains Learn about key elements of blockchain theory such as decentralization, cryptography, and consensus protocols Get to grips with Solidity, Web3, cryptocurrencies, smart contract development and solve scalability, security and privacy issues Discover the architecture of different distributed ledger platforms including Ethereum, Bitcoin, Hyperledger Fabric, Hyperledger Sawtooth, Corda and Quorum Book Description Blockchain is the backbone of cryptocurrencies, with applications in finance, government, media, and other industries. With a legacy of providing technologists with executable insights, this new edition of Mastering Blockchain is thoroughly revised and updated to the latest blockchain research with four new chapters on consensus algorithms, Serenity (the update that will introduce Ethereum 2.0), tokenization, and enterprise blockchains. This book covers the basics, including blockchain's technical underpinnings, cryptography and consensus protocols. It also provides you with expert knowledge on decentralization, decentralized application development on Ethereum, Bitcoin, alternative coins, smart contracts, alternative blockchains, and Hyperledger. Further, you will explore blockchain solutions beyond cryptocurrencies such as the Internet of Things with blockchain, enterprise blockchains, tokenization using blockchain, and consider the future scope of this fascinating and disruptive technology. By the end of this book, you will have gained a thorough comprehension of the various facets of blockchain and understand their potential in diverse real-world scenarios. What you will learn Grasp the mechanisms behind Bitcoin, Ethereum, and alternative cryptocurrencies Understand cryptography and its usage in blockchain Understand the theoretical foundations of smart contracts Develop decentralized applications using Solidity, Remix, Truffle, Ganache and Drizzle Identify and examine applications of blockchain beyond cryptocurrencies Understand the architecture and development of Ethereum 2.0 Explore research topics and the future scope of blockchain Who this book is for If you are a technologist, business executive, a student or an enthusiast who wishes to explore the fascinating world of blockchain technology, smart contracts, decentralized applications and distributed systems then this book is for you. Basic familiarity with a beginner-level command of a programming language would be a plus.


Architectures and Protocols for Secure Information Technology Infrastructures

Architectures and Protocols for Secure Information Technology Infrastructures

Author: Ruiz-Martinez, Antonio

Publisher: IGI Global

Published: 2013-09-30

Total Pages: 427

ISBN-13: 1466645156

DOWNLOAD EBOOK

With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for researchers, engineers, and professionals interested in exploring recent advances in ICT security.


Computational Science and Its Applications - ICCSA 2007

Computational Science and Its Applications - ICCSA 2007

Author: Osvaldo Gervasi

Publisher: Springer

Published: 2007-08-29

Total Pages: 1152

ISBN-13: 3540744770

DOWNLOAD EBOOK

This three-volume set constitutes the refereed proceedings of the International Conference on Computational Science and its Applications. These volumes feature outstanding papers that present a wealth of original research results in the field of computational science, from foundational issues in computer science and mathematics to advanced applications in almost all sciences that use computational techniques.


Security and Privacy in the Age of Uncertainty

Security and Privacy in the Age of Uncertainty

Author: Sabrina de Capitani di Vimercati

Publisher: Springer

Published: 2013-06-29

Total Pages: 509

ISBN-13: 0387356916

DOWNLOAD EBOOK

Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including: *Secure Networks and Distributed Systems; *Secure Multicast Communication and Secure Mobile Networks; *Intrusion Prevention and Detection; *Access Control Policies and Models; *Security Protocols; *Security and Control of IT in Society. This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.


Composition of Secure Multi-Party Protocols

Composition of Secure Multi-Party Protocols

Author: Yehuda Lindell

Publisher: Springer Science & Business Media

Published: 2003-09-08

Total Pages: 216

ISBN-13: 9783540201052

DOWNLOAD EBOOK

In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results assert that under certain assumptions one can construct protocols for securely computing any desired multi-party functionality. However, this research relates only to a setting where a single protocol execution is carried out. In contrast, in modern networks, many different protocol executions are run at the same time. This book is devoted to the general and systematic study of secure multi-party computation under composition. Despite its emphasis on a theoretically well-founded treatment of the subject, general techniques for designing secure protocols are developed that may even result in schemes or modules to be incorporated in practical systems. The book clarifies fundamental issues regarding security in a multi-execution environment and gives a comprehensive and unique treatment of the composition of secure multi-party protocols.