ITM 350 Chapter 6: ITM 350 Chapter 6 Notes.docx

66 views2 pages

Document Summary

Edi systems have made use of value-added networks (vans) as a platform for operation. Cash is portable, because it can be carried easily by a person. Cash has the characteristics of portability, acceptance, anonymity (not identification), and instant transfer of value. Based on public key cryptography involving the use of private key to sign messages and a public key to verify signatures. E-cash has the feature of non-repudiation (once it"s done, it cannot be taken back) echeck: echecks work in exactly the same way as paper cheques do, except for the electronic base. Most websites that accept credit cards have adopted measures such as ssl/https. Ssl/https protocols are protocols for sending encrypted data from a web browser to a server (ssl = secure socket layer) However, credit card fraud is still a large problem. To solve this problem set protocol was created. Secure electronic transaction (set) protocol is a method of securing credit card transactions using encryption and authentication technology.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents

Related Questions