Sponsored by ComputerWeekly.com
The integration of electronic transactions throughout the spectrum of business and our individual daily activities is undeniably widespread. The shift from the standard bricks-and-mortar environment with point of sale (POS) transactions to the virtual, electronic, card-not-present (CNP) environment have expanded the attack surface and created the need for higher security in transactions. This report looks in detail at two key principles necessary for secure payments: fair exchange and non-repudiation for the participants. Access >>>
Table of contents
- The magnitude of payment protocols
- Evolution of fair-exchange protocols
- The Netbill protocol
Premium Content for Free.
More Premium Content Accessible For Free
Social Media: IT Purchasers get social, marketers play catch up ?
IT decision makers are using social media effectively at work, but marketers are playing catch up, according to this research snapshot.
Can national security and privacy co-exist?
In this week’s Computer Weekly, we talk to NSA whistleblower Bill Binney about the often-conflicting needs of security and privacy. We find out how ...
Cultivating IT Talent
While the latest GCE A-Level results suggest that more people than ever will go on to study science, technology, engineering and maths (Stem) courses...