All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
computer science
protocols for secure electronic commerce
Questions and Answers of
Protocols For Secure Electronic Commerce
Explain the challenges faced in the use of SSL accelerators.
Why are TLS/SSL implementations so difficult to secure?
Why did RC4 continued to be used in TLS even though the U.S. federal government prohibited its use in government installations?
What is the advantage of delaying data transmission until both sides have exchanged and verified their Finished messages?
How can a denial-of-service attack be mounted against some versions of SSL/TLS? How can the use of cryptographic puzzles offer some protection?
Describe the main standardization organizations in business-to-business electronic commerce.
What is the counter mode of block cipher encryption?What are its advantages?
What is needed to offer nonrepudiation services?
Discuss some potential applications for blind signatures.
Compare at least three characteristics of business-to-business commerce with business-to-consumer commerce.
What is the main difference between EDIFACT and X12?
How can mobile commerce be integrated into the supply chain?
What are the main benefits and main costs related to business-to-business e-commerce?
How can business-to-business electronic commerce simplify the activities of the supply network?
Describe how business-to-business e-commerce is applied in the automotive industry.
Why are standards needed for business-to-business electronic commerce?
What factors can affect order fulfillment in business-to- business e-commerce?
Compare and contrast traditional EDI and ebXML.
Compare the limitations and advantages of the platforms for traditional EDI as compared to web-based platforms.
Compare and contrast business-to-business and business-to-consumer e-commerce in terms of procurement processes, order sizes, market sizes, and workflow.
List the advantages and disadvantages of controlling the export of strong encryption algorithms from the United States.
Show that a valid ECDSA signature satisfies the condition r = xP mod q.
What are the problems facing cross-certification? How are financial institutions attempting to solve them?
Speculate on the reasons that led to the declassification of the SKIPJACK algorithm.
Explain why the length of the encryption key cannot be used as the sole measure for the strength of an encryption.
What are the reasons of the current interest in elliptic curve cryptography (ECC)?
Compare public key encryption and symmetric encryption in terms of advantages and disadvantages. How to combine the strong points of both?
Using the case of AES as a starting point, define a process to select a new encryption algorithm.
What is the DomainKeys Identified Mail (DKIM)? Describe its advantages and drawbacks.
What is the Sender Policy Framework (SPF)? Describe its advantages and drawbacks.
What is cross-certification and why is it used? What caveats need to be taken considered for it to work correctly?
Which of the following items is not in a digital public key certificate?(a) The subject’s public key (b) The digital signature of the certification authority (c) The subject’s private key (d)
What conditions favor denial-of-service attacks?
Discuss some of the vulnerabilities of biometric identification systems.
Compare and contrast the following biometrics: fingerprint, face recognition, iris recognition, voice recognition, and hand geometry.
Discuss the difference between biometric identification and biometric verification.
What factors affect the strength of encryption?
Why is the Authentication header (AH) less used with IPSec than the Encapsulating Security Payload (ESP) protocol?
Compare the tunnel mode and transport mode of IPSec.
What are the services needed to secure data exchanges in e-commerce?
What are the major security vulnerabilities in a client/server communication?
In a push transaction, one party sends a payment to its correspondent. In a pull transaction, one party receives a payment from the other party. Indicate which of the following transactions is a push
What is the difference between clearance and settlement?
What are the risks associated with contactless payments?
What factors affect consumer selection of a payment instrument?
What factors affect merchants’ adoption of new payment instruments?
What were the intended and unintended consequences of the approval of the WEB transaction code in 2001?
Compare the use of money in open versus closed payment circuits.
What transactions are excluded in the estimates of nonbank payments in the United States?
What is the difference between the money stored in a transportation card and the money stored in an electronic purse?
What are the advantages of prepaid cards in public transportation systems?
What is the advantage of carrying addenda records with each financial transaction using the CTX credit transaction in ACH?
What are the risks in using debit cards in the United States (before the introduction of EMV)?
What are some of the necessary steps to ensure the success of a payment system based on smart cards?
Match items from column A with the corresponding item in column B. Column A CCD debit TEL PPD debit CIE CCD credit PPD credit Column B Supplier payment Recurring bills Payroll, pension, and benefit
Compare client-based and server-based (virtual) wallets.
What are the advantages of RTGS for retail payments?
What are the factors that encourage the use of RTGS?
Compare credit risk with liquidity risk.
Match items from column A with the corresponding item in column B. Column A Fedwire Systemic risk Large-Value Transfer System (LVTS) Column B The risk that the inability of one of the participants
What are the risks associated with prepaid cards?
What is the Bank for International Settlements?
What is SEPA?
What is the main role of NACHA?
What is the role of the U.S. Federal Reserve System?
What is SWIFT?
Evaluate the evolution from magnetic strip cards to smart cards in payments from the point of view of the user, the merchant, the bank, the card manufacturer the chip manufacturer and the card
What are the arguments for and against cash?
Compare the technologies currently used for bank notes, bank cards, paper checks and electronic bill presentment, electronic bill presentment in terms of cost, security, and user’s convenience.
What are the three aspects of security from a user’s viewpoint?
List two anticompetitive issues that may arise in electronic procurement.
What are the main benefits and main costs related to business-to-business e-commerce?
Describe the kiosk business model.
Discuss the role of standards in electronic commerce. Consider standards at the terminals, networks, and applications. Provide advantages and disadvantages of standards.
What are the specific security challenges for mobile commerce compared to electronic commerce from laptop or desktop devices?
Compare the roles of barcode technology with RFID technology in supply chain management.
Name the 2D barcodes used for (a) Bitcoin addresses,(b) Train tickets on Eurostar, (c) UPS, (d) A paper boarding pass on an airline, (e) EIA, (f) U.S. DoD,(g) U.S. IDs.
What are the goods sold in digital commerce (electronic or mobile)?
Comment on the following definitions of e-commerce adapted from the September 1999 issue of the IEEE Communications Magazine:• It is the trade of goods and services in which the final order is
Showing 100 - 200
of 179
1
2