|
[1] D. Abrazhevich, “Classification and Characteristics of Electronic Payment Systems,” EC-Web 2001, Lecture Notes in Computer Science 2115, pp. 81-90, 2001. [2] R. Atkinson, “Security Architecture for the Internet Protocol,” RFC 1825, NavalResearch Laboratory, 1995. [3] M. Bellare, J. A. Garay, R. Hauser, A. Herzberg, H. Krawczyk, M. Steiner, G.Tsudik, and M. Waidner, “iKP — A Family of Secure Electronic Payment Protocols,” Extended Abstract, USENIX Workshop on Electronic Commerce. July11-12, 1995. [4] N. Borenstein, “Vulnerability of Software Based Credit Card Encryption,” At http://fv.com/ccdanger/index.html; see also San Jose Mercury News, 29 January 1996, “Program shows ease of stealing credit information” by Simpson L.Garfinkel. [5] R. Braden, D. Clark, S. Crocker and C. Huitema, “Security in the Internet Architecture,” RFC 1636, 1994. [6] S. Brands, “Untraceable Off-Line Cash in Wallets with Observers,” Lecture Notes in Computer Science 773, Advances in Cryptology: Proc. Crypto ''93, Springer, pp. 302 —318, 1994. [7] Brokat. X-Pay, available at http://www.brokat.com. [8] D. Chaum, A. Fiat, and N. Naor, “Untraceable electronic cash,” LNCS 403, Proceedings Crypto ''88, pp. 319-327, 1988. [9] B. Cox. “Maintaining Privacy in Electronic Transactions,” Information Networking Institute Technical Report TR 1994─8, Fall 1994. [10] B. Cox, J. D. Tygar, and Marvin Sirbu, “NetBill Security and Transaction Protocol,” Proceedings of the First USENIX Workshop in Electronic Commerce, pp. 77~88, 1995. [11] D. W. Davies and W. L. Price, Security for Computer Networks: an Introduction to Data Security in Teleporcessing and Electronic Funds Transfer, 2nd Edition. Wiley, 1989. [12] S. Fischmeister, G. Hagleitner, W. Pree. “Hermes--A Lean M-commerce Software Platform Utilizing Electronic Signatures,” Proceedings of 35th Annual Hawaii International Conference on System Sciences (HICSS''02)-Volume 9 January 07-10, 2002 [13] H. Gobioff, S. Smith, J. D. Tygar and B. Yee, “Smartcards in Hostile Commerce, Environments,” Proceedings of the Second lJSENlX Workshop on Electronic November 1996. [14] E. B. Hickman and T. Elgamal, “The SSL Protocol,” Internet Draft. June 1995. [15] R. Housley, W. Ford, W. Polk and D. Solo, “Internet Public Key Infrastructure, X.509 Certificate and CRL Profile,” RFC [tbd], 1997. [16] G. Jennifer, B. Steiner, C. Neuman and J. I. Schiller, “Kerberos: An Authentication Service for Open Network Systems,” USENIX Winter Conference, pp. 191-202, February 1988. [17] P. Loshin, “Electronic Commerce — On-Line Ordering and Digital Money,” Charles River Media, Inc. 1995. [18] D. C. Lynch and L. Lundquist, “Digital Money — The New Era of Internet Commerce,” John Wiley & Sons, Inc, p. 96, 1996. [19] K. Maddox, M. Wagner, and C. Wilder, “Making Money on the Web,” Information Week, pp. 31-40, 1995. [20] General Magic. Telescript Technology, “The Foundation for the Electronic.Marketplace,” Technical report, General Magic, 1996. http://www.Genmagic.Com/Telescript/Whitepapers/wpl/whitepaper-1.html [21] Mastercard International and Visa International, Secure Electronic Transaction (SET) Specification, June 1996, http://www.visa.com or http://www.mastercard.com. [22] Mastercard International and Visa International, “Business Description.Draft for Public comment,” Secure Electronic Transaction (SET) Specification, Book1, February 23, 1996. [23] P. Neumann, “Risks in Digital Commerce,” Communications of the ACM. January 1996. [24] P. Panurach, “Money in Electronic Commerce: Digital Cash, Electronic Fund Transfer, and Ecash,” Communications of the ACM, pp. 45-50, 1996. [25] Paybox. Die paybox-Gruppe strukturiert um, available at http://www.paybox.de. [26] R. Rivest, A. Shamir, and I. Adleman, “A Method for Obtaining Digital No. 2, pp 42. Signatures and Public-Key Cryptosystems,” Communications of the ACM, Vol. 21, 120-126, 1978. [27] M. Sirbu and J. D. Tygar. “NetBill: an Internet Commerce System Optimized for Network Delivered Services,” IEEE Personal Communications, pp. 34-39, August 1995. [28] The WAP Forum, “Wireless Application Protocol Architecture Specification,” available at http://www1.wapforum.org/tech/documents/ WAP-210-WAPArch-20010712-a.pdf [29] The WAP Forum, “Wireless Transport Layer Security Specification,” available at http://www1.wapforum.org/tech/terms.asp?doc= WAP-261-WTLS-20010406-a.pdf [30] J. D. Tygar. “Atomicity in Electronic Commerce,” the 21st ACM Principles of Distributed Computation, 1996. [31] SANS Institute, “The GSM Standard (An overview of its security),” available at http://www.sans.org/rr/papers/58/317.pdf [32] B. Yee and J. D. Tygar, “Secure Coprocessors in Electronic Commerce Applications,” Proceedings of the First USENIX Workshop on Electronic Commerce, pp. 155-170, July 1995.
|