|
References〔1〕Mastercard and Visa, Secure Electronic Transaction(SET) Specification Book1:Business Description, Version1.0, May 31, 1997.〔2〕Mastercard and Visa, Secure Electronic Transaction(SET) Specification Book2:Programmer’s Guide, Version1.0, May 31, 1997.〔3〕Mastercard and Visa, Secure Electronic Transaction(SET) Specification Book3:Formal Protocol Definition, Version1.0, May 31, 1997.〔4〕William Stallings, Cryptography and Network Security, Principles and Practice, Second Edition, pp.461, 1999, Alan Apt.〔5〕Shaohua Tang and Weihua Ma, “The Design of HTTP-based Cardholder Registration Software for SET”, Proceedings of the IEEE SET, pp.756- 758, 2000.〔6〕Shaohua Tang and Gang Wei, “Directed User Authentication Schemes”, Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-commerce, Manuel Blum and C H Lee, Eds. Hong Kong, Hong Kong:City University of Hong Kong Press, pp.99-104, 1999.〔7〕Vijay Ahuja, “Building Trust in Electronic Commerce”, Proceedings of the IEEE Electronic Commerce, pp.61-63, 2000.〔8〕MasterCard and Visa, Secure electronic Transaction(SET) Specification Book1:Business Description, Version1.0, pp.6-9, May 31, 1997.〔9〕William Stallings, Cryptography and Network Security, Principles and Practice, Second Edition, pp.462, 1999, Alan Apt.〔10〕William Stallings, Cryptography and Network Security, Principles and Practice, Second Edition, pp.240-244, 1999, Alan Apt.〔11〕賴溪松, 韓亮, 張真誠, 近代密碼學及其應用, 松崗電腦圖書資料股份有限公 司, pp.6-10, 1999. 〔12〕張真誠, 林祝興, 江季翰, 電子商務安全, 松崗電腦圖書資料股份有限公 司,pp4-2~4-5, 2000.〔13〕Thomas O. Wells,“Electronic and Digital Signatures:In Search of a Standard”, Proceedings of the IEEE Electronic Commerce, pp.24-30, 2000.〔14〕中華電信股份有限公司數據通信分公司, GCA簡介, 2001.〔15〕張耀仁, 劉永信, 電子商務系統, 高立圖書有限公司, 2000.〔16〕Shiyong Lu, Scott A. Smolka,“Model Checking the Secure Electronic Transaction(SET)Protocol”, Proceedings of the IEEE SET, 2000.〔17〕Capt James M. Hayes,“Secure In-Band Update of Trusted Certificates”, Proceedings of the Office of INFOSEC Research and Technology, 2000.〔18〕MARVIN A. SIRBU,“Credits and debits on the Internet”, Proceedings of the IEEE Electronic Payments, pp.23-29, 1997.〔19〕賴溪松, 資訊安全通訊, 中華民國資訊安全學會, Vol.7, No.3, June 2001.〔20〕Dominique Bolignano, GIE Dyade, “Towards the Formal Verification of Electronic Commerce Protocols”, Proceedings of the IEEE Electronic Commerce, pp.133-146, 1997. 〔21〕Heiko Schuldt, Andrei Popovici, Hans-Jorg Schek,“Automatic Generation of Reliable E-Commerce Payment Process”, Proceedings of the IEEE Electronic Commerce, pp.434-441, 2000.〔22〕Radia Perlman, “An Overview of PKI Trust Models”, Proceedings of the IEEE PKI, pp.38-43, 1999.〔23〕M.PaPa, O.Bremer, J.Hale, S.Shenoi, “Formal Analysis of E-Commerce Protocols”, Proceedings of the IEEE Electronic Commerce, pp.19-28, 2001.〔24〕Scott D. Stoller, “A Bound on Attacks on Payment Protocols”, Proceedings of the IEEE SET, pp.61-70, 2001.〔25〕林祝興, 電子商務安全本土化教材大綱編撰成果報告, 教育部顧問室, pp.65- 73, 1999.〔26〕Simson Garfinkel, Euguene H. Spafford, “Cryptography and the Web”, http://www.w3j.com/7/s3.crypt.wrap.html, 2000.〔27〕Dieter Gollmann, “E-commerce security”, Computing & Control Engineering Journal, pp.115-118, June, 2000.〔28〕Bruce Schneier, “Applied Cryptography”, Second Edition, John Wiley & Sons, Inc, pp.429-459, 1996.〔29〕楊吳泉, 現代密碼學入門與程式設計, 全華科技圖書股份有限公司, 1997.〔30〕張真誠, 電腦密碼學與資訊安全, 松崗電腦圖書資料股份有限公司, 1999.〔31〕William Stallings, Cryptography and Network Security, Principles and Practice, Second Edition, pp.467-472, 1999, Alan Apt.
|