ITM 350 Chapter 6: ITM 350 Chapter 6 Notes.docx

66 views2 pages

Document Summary

Edi systems have made use of value-added networks (vans) as a platform for operation. Cash is portable, because it can be carried easily by a person. Cash has the characteristics of portability, acceptance, anonymity (not identification), and instant transfer of value. Based on public key cryptography involving the use of private key to sign messages and a public key to verify signatures. E-cash has the feature of non-repudiation (once it"s done, it cannot be taken back) echeck: echecks work in exactly the same way as paper cheques do, except for the electronic base. Most websites that accept credit cards have adopted measures such as ssl/https. Ssl/https protocols are protocols for sending encrypted data from a web browser to a server (ssl = secure socket layer) However, credit card fraud is still a large problem. To solve this problem set protocol was created. Secure electronic transaction (set) protocol is a method of securing credit card transactions using encryption and authentication technology.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents

Related Questions