Abstract
The search for security is not a modern day phenomenon. Around 2000 B.C. the Egyptians developed what was perhaps the first key operated lock mechanism. This device consisted of a solid beam, carved from hardwood and hollowed from the end to create a slot. When locked, this beam was prevented from moving by the means of pegs in a staple, attached to the hollowed beam. Unlocking the lock required a key, typically a foot in length or more. This ancient design evolved into its modern day equivalent known as the tumbler lock, which still fundamentally uses the same technology. The only major difference is simply the size.
Keywords
- Smart Card
- Advance Encryption Standard
- Certification Authority
- Data Encryption Standard
- Secure Socket Layer
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag London
About this chapter
Cite this chapter
Chesher, M., Kaura, R., Linton, P. (2003). Securing e-Business. In: Electronic Business & Commerce. Springer, London. https://doi.org/10.1007/978-1-4471-0077-5_12
Download citation
DOI: https://doi.org/10.1007/978-1-4471-0077-5_12
Publisher Name: Springer, London
Print ISBN: 978-1-85233-584-7
Online ISBN: 978-1-4471-0077-5
eBook Packages: Springer Book Archive