Analysis and design of stream ciphers
Analysis and design of stream ciphers
A course in number theory and cryptography
A course in number theory and cryptography
Authentication and authenticated key exchanges
Designs, Codes and Cryptography
The official PGP user's guide
On the security of multiple encryption
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Trusted third parties in electronic commerce
BT Technology Journal
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
The Internet — past, present and future
BT Technology Journal
Electronic commerce comes to the ‘Net‘
BT Technology Journal
BT Technology Journal
Trusted third parties in electronic commerce
BT Technology Journal
Challenges for copyright in a digital age
BT Technology Journal
BT Technology Journal
Real-time applications on the Internet
BT Technology Journal
BT Technology Journal
Smart Cards in Electronic Commerce
BT Technology Journal
An Introduction to Electronic Commerce
BT Technology Journal
Secure Digital Archiving of High-Value Data
BT Technology Journal
Study on security based on PKI for e-commerce of statistics information system
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
Hi-index | 0.00 |
The promise of tomorrow‘s electronic business environment will not be fully realised unless government, business and consumers have a high level of confidence in the security of that environment. The use of cryptography can provide this confidence and facilitate the establishment of a global electronic market-place. Cryptographic techniques offer a range of services including confidentiality, authenticity, integrity and anonymity. We examine some of these techniques and explain why a trusted third party infrastructure is seen as a crucial component in the successful introduction of an electronic business arena. The widespread use of cryptography, however, also presents possible new opportunities for criminal activity. To mitigate against this many governments have proposed the provision of escrowed cryptographic services — we review a particular scheme favoured by the UK government.