跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.119) 您好!臺灣時間:2025/11/24 12:57
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:徐和謙
研究生(外文):Hsu Ho Chien
論文名稱:安全電子付款系統之設計
論文名稱(外文):Design of Secure Electronic Payment System
指導教授:黃宗立黃宗立引用關係
指導教授(外文):Hwang Tzone Lih
學位類別:碩士
校院名稱:國立成功大學
系所名稱:資訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2001
畢業學年度:89
語文別:中文
論文頁數:62
中文關鍵詞:付款
外文關鍵詞:Payment
相關次數:
  • 被引用被引用:3
  • 點閱點閱:203
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
近幾年來,Internet迅速發展,其中透過網際網路來交易的電子商務也相當熱門。但是目前用來保護網路交易的安全機制並不是十分的完善,仍有相當多的改進空間。
本論文主要目的,就是在於設計、實現一個安全、功能強大且能實際應用的電子付款系統,並透過CA-PKI(Public Key Infrastructure)及近代密碼學的相關技術來保障本系統在網路上所傳送的各種機密資訊都能夠被保護,也能確保資料完整性並且通訊雙方都能互相確認彼此的身份,進而達到保護網路交易的安全性與公平性。而且能針對付款金額大小的不同提供對應的付款機制,來兼顧執行效益與安全性。
提要i
致謝ii
目錄iii
圖表目錄iv
1.導論1
1.1前言1
1.2近代密碼學技術2
1.3憑證管理中心(Certificate Authority)6
1.4現行的安全付款機制7
SET(Secure Electronic Transaction™)7
SSL(Secure Socket Layer)11
1.5研究動機與目的13
2 Epayment安全電子付款系統14
2.1系統介紹14
2.2Epayment系統之討論19
3.Epayment系統之實做22
4.小額付款28
4.1小額付款簡介28
Millicent29
PayWord30
SVP31
4.2 ezPay小額付款機制33
4.3 ezPay安全性討論38
4.4 ezPay系統特色39
4.5 ezPay與PayWord用途的比較39
4.6Epayment小額付款部分的補強40
4.7ezPay流程圖41
5.結論45
5.1結論45
5.2未來展望45
參考文獻47
附錄 A-Epayment系統封包格式50
附錄 B-Epayment系統流程圖53
[1]William Stallings,”Cryptgraphy and Network Security Principles And Practice 2nd Edition” Prentice Hall International, Inc.1999
[2]Schneier B. Applied Cryptography, Jogn Wiley and Sons, Inc. 1994, pp.17-41.
[3]William Stallings,“Network And Internetwork Security Principles And Practice”, Prentice Hall International Edition, 1995, pp. 1-14
[4]賴溪松,韓亮,張真誠,”近代密碼學及其應用” 松崗電腦圖書資料股份有限公司, 1998
[5]NBS FIPSPUB 46, Data Encryption Standard, National Bureau of Standards, U.S. Department of Commerce, Jan, 1977
[6]X. Lai and J. Massey, “A proposal for a New Block Encryption Standard,” Advances in Cryptology-EUROCRYPT’90 Proceedings, Berlin: Springer-Verlag, 1991, pp.389-404
[7]R.Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM, V.21, n.2, Feb 1978, pp.120-126
[8]T.ElGamal, “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” Advances in Cryptology-CRYPTO’84 Proceedings, Berlin: Springer-Verlag, 1985, pp.10-18.
[9]V. Miller, “Uses of Elliptic Curves in Cryptography”, Advances in Cryptology CRYPTO ''85, Lecture Notes in Computer Science, 218 (1986), Springer-Verlag, 417-426.
[10]J. Nechvatal, “Public-Key Cryptography,” In Contemporary Cryptology-The Science of Information Integrity, G.J. Simmons, ed., Piscatoway, N.J.: IEEE Press, 1992, pp.177-288
[11]李南逸,黃宗立, “數位簽章系統之設計與分析,” 國立成功大學資訊工程研究所博士論文, 1996
[12]R.Rivest, The MD5 Message Digest Algorithm, RFC 1321, Apr. 1992.
[13]NIST FIPS PUB 180-1, Secure Hash Standard, National Institute of Standards and Technology, U.S. Department of Commerce, Apr. 1995
[14]PKI TWG 96, Federal Public Key Infrastructure (PKI) Technical Specifications (Version 1) Part A: Requirements, Jan. 1996, pp.3-5
[15]CCITT X.500 Series (1992) | ISO/IEC 9594,1--9, Information Technology -- Open Systems Interconnection -- The Directory, 1992.
[16]ITU-T Recommendation X.509 (1997 E): Information Technology - Open Systems Interconnection - The Directory: Authentication Framework, June 1997.
[17]Weidong Kou,”Networking Security And Standards,”KLUWER ACADEMIC PUBLISHERS
[18]VISA, MasterCard, SET Secure Electronic Transaction Specification, Book 1-3, 1997
[19]資策會市場情報中心 王瑞之經理,”網路瞎拼為期不遠-談SET標準,” http://www.ec.org.tw/info/security/setdoc1.htm
[20]Netscape Communication Corp. CA, USA, Secure Sockets Layer, http://developer.netscape.com/docs/manuals/security/sslin/index.htm
[21]Manasse,M. “The MillicentProtocols for Electronic Commerce,”Proc. 1st USENIX workshop on Electronic Commerce, New York, NY, July 11-12, 1995, http://www.research.digital.com/SRC/millicent/
[22]R.L. Rivest and A. Shamir, “PayWord and MicroMint:Two simple micropayment schemes,” May 7, 1996. http://theory.lcs.mit.edu/~rivest/RivestShamir-mpay.pdf
[23]J. Stern and S. Vaudenay, "SVP: a Flexible Micropayment Scheme," Advances in Cryptology - Proceedings of Financial Cryptography ''97, pp. 161-171.
[24]Khanh Q. Nguyen, Yi Mu, and Vijay Varadharajan, "Micro-Digital Money for Electronic Commerce," Proc. of the IEEE 13th Annual Computer Security Applications Conference (ACSAC ''97), 1997
[25]Furche, A., and G. Wrightson, “SubScrip-An efficient protocol for pay-per-view payments on the Interner,”Proc. 5th International Conference on Computer Communication and Networks(ICCCN ‘96), Rockville, MD, Oct. 16-19, 1996.
[26]嚴嵩銘, “Recent Researches of Internet Micro-Payment Techniques,” http://www.csie.ncu.edu.tw/~yensm/lcis.html
[27]Chi, Ellis, “Evaluation of Micropayment Schemes,” HP Labs Technical Reports. http://www.hpl.hp.com/techreports/97/HPL-97-14.html
[28]張真誠,林祝興,江季翰, ”電子商務安全”松崗電腦圖書資料股份有限公司
[29]Kalakota, Whinston,”Frontiers of Electronic Commerce”Addison Wesley查修傑,連麗真,陳雪美 譯”電子商務概論”愛迪生維斯理朗文台灣分公司
[30]林俊杰”Visual C++ 6視窗程式設計經典,”碁峰資訊股份有限公司,1999
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top