All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
computer science
protocols for secure electronic commerce
Questions and Answers of
Protocols For Secure Electronic Commerce
Can copyright protection clash with the free flow of information for e-commerce? Explain with an example.
What are the difficulties regarding taxation of e-commerce?
What are the similarities between the United States and the European position regarding the protection afforded to data collected from users in e-commerce?
What is escheat? How is it affected by the various types of e-commerce?
What is the role of standards in e-commerce? Discuss their advantages and disadvantages.
What is the main difference between a substitute check and a virtual check?
Why is a remote deposit capture not a legal replacement of a paper check?
What specific fraud risk is specific to check imaging and/or check truncation?
What is check conversion?
Discuss the factors favoring or opposing the use of check imaging.
What are the differences between electronic check presentment and check imaging?
What is point-of-sale check approval?
What is check truncation? What are the difficulties in implementing this technique?
What are the advantages of dematerialized checks?
Name three components for the cost of paper checks.
Explain the advantages of Base58 encoding.
What are the four types of nodes in a Bitcoin network?
What are the functions of the full nodes in a Bitcoin network?
What are the common functions of all nodes in a Bitcoin network?
Show that the maximum number of currency units in Bitcoin is 21 × 1014.
Define mining and explain its role in the Bitcoin process.
Explain the various ways a person could participate in the mining of bitcoins.
Show that if the rate of block discovery is 6 blocks per hour, then 2016 blocks are discovered in 2 weeks.
Show that on average the miner reward is halved every 4 years approximately.
Show that the expected value of a geometric distribution with a probability of an event p is 1/p.
What is a blockchain browser?
Calculate the difficulty D corresponding to an encoded target difficulty of 0x1B3CC3668.
Calculate the target hash with an encoded target difficulty of 0x1903A30C.
How is a user’s Bitcoin balance calculated?
What are the limitations of mixes in obfuscating the Bitcoin transaction history?
Compare fiat/government currencies and cryptocurrencies.
It is sometimes said that the first generation of online micropayment systems was technical solutions in search of a problem. Do you agree?
How can untraceability and inheritance be made compatible within the scope of digital money?
Name some of the legal challenges facing digital money systems.
What are the strengths and weaknesses of PayPal?
What are the reasons that PayPal outwitted its competitors?
Evaluate the risks of PayPal in the consumer space.
Describe the phases of PayPal’s growth.
What is the difference between the money stored in a bus card or a telephone card and the money stored in an electronic purse such as GeldKarte?
Why is the role of the service provider important in second-generation remote micropayment systems?
What were the advantages of First Virtual? What are the possible reasons that the business folded?
Speculate on the reasons behind the lack of electronic purse projects in the United States.
How can operational costs be reduced in micropayment systems?
What are the various ways of processing micropayments?
What are the advantages and disadvantages of the use of mobile phones for payments over separate smart cards?
Why is the bank-centric operation associated with dual-chip or dual-slot phones?
What arrangements can be made to avoid giving a specific bank or a network operator the central player in mobile payments?
Define an embedded SIM.
Why are there many options for the inclusion of the secure element in mobile terminals?
What are the main options for the inclusion of the secure element in mobile terminals?
Evaluate the use of software emulation in the provision of the secure element in mobile terminals.
What is the purpose of Java2 Platform Micro Edition (J2ME)?
Compare and contrast rooting and jail breaking.
Discuss the vulnerabilities of using Bluetooth for mobile payments.
Describe the operating modes of NFC.
Compare NFC and Bluetooth.
What is the main difference between static data authentication (SDA) and dynamic data authentication (DDA)?
Compare and contrast NFC and RFID.
Compare the NFC protocol with the ISO/IEC 14443 standard.
Explain the differences between active and passive contactless cards.
List some disadvantages for the lack of standards in electronic toll collection systems using RFID.
How does the card verification value (CVV)/card verification code (CVC) enhance the security of magnetic stripe cards?
What is the difference between the CVV/CVC and the CVV2/CVC2?
In the NAETEA protocol, • What is the function of the shared key between the terminal and the mobile network?• How does the web server authenticate the terminal?• Why is the session key
What is the main difference in key generation between SSL Version 3.0 and TLS 1.0?
Compare magnetic stripe cards with integrated circuit cards in terms of cost and security.
Compare the processing of payment transactions with magnetic strip and integrated circuit cards using EMV.
What are the main constraints on the security of smart cards?
What is a semipassive contactless card/tag?
Compare the characteristics of payment with contactless cards and with near-field communication.
What are the main steps of dynamic data authentication (DDA)?
Compare the characteristics of the different methods of data authentication.
Compare and contrast deterministic dynamic authentication and probabilistic dynamic authentication.
What are the advantages and disadvantages of tokenization?
Why cannot EMV with CDA protect against relay attacks?
What are the main security vulnerabilities in point-of-sale transactions with magnetic stripe cards?
How can the security of the CVV/CVC code be bypassed?
Describe a typical fraud with PIN debit transactions.
How do the PCI DSS standards protect cardholder’s data?
Why are there many names for the cryptogram used in online transaction?
Describe the various categories of online attacks on payment transactions.
Explain how 3-D Secure offers the services of confidentiality, authentication, integrity, and nonrepudiation.
What are the advantages and limitations of 3-D Secure?
What are the factors that delayed the adoption of chip payment cards in the United States?
Explain the market preference of TLS/SSL solutions over SET.
How was SET adapted to integrated circuit cards?
What is 3D SET?
What are the main characteristics of the SET wallet (stored on a hard disk or a smart card)?
Compare the payment solutions using TLS/SLL solution to the solution that SET offers.
Enumerate the keys of an acquirer bank if it is also a certification authority.
What is the purpose of the dual signature in SET?
List some sources of incompatibilities between WTLS and TLS.
Why are some weak encryption algorithms used in WTLS?
Compare and contrast solutions to the problem of the unencrypted message in WTLS/TLS conversion.
What are the advantages and disadvantages of using SSL/TLS in electronic commerce?
Define perfect forward secrecy.
What is a cipher suite in SSL/TLS?
What are the main improvements of TLS 1.0 over SSL Version 3.0?
How does the establishment of a TLS/SSL connection differ from the establishment of a TLS/SSL session?
What are the advantages and disadvantages of the ephemeral mode of operation in TLS/SSL?
Showing 1 - 100
of 179
1
2