|
[1]H. Aksashika, H. Moribatake, and J. Gohhara, “Fast Micro-payment Scheme,” Symp. on Cryptography and information Security, Jan. 1996.
[2]R. Anderson, C. Manifavas, and C. Sitherland, Netcard-A Practical Electronic Cash System, Computer Laboratory, Cambridge, 1995.
[3]L. Buttyan, “Removing the financial incentive to cheat in micropayment schemes,” Electronics Letters, Vol. 36, No. 2, Jan. 2000, pp. 132-133.
[4]D. Chaum, “Blind signature for untraceable payments,” Advances in Cryptology, Crypto’82, Aug. 1982, pp.199-203.
[5]Y.H. Chen, Y.H. Liu, Y.Y. Chen and C.H. Song, “Online checking micro-payment system in the mobile environment,” The Proceeding of the Second International Workshop for Asian Public Key Infrastructures, 2002, pp. 142-146.
[6]W. Ham, H. Choi, Y. Xie, M. Lee, and K. Kim, “Secure One-way Mobile. Payment System Keeping Low Computation in Mobile Devices,” The Proceeding of WISA, 2002, pp. 287-301.
[7]R. Hauser, M. Steiner, and M. Waidner, Micro-Payments based on iKP, IBM Zurich, 1996.
[8]Z.-Y. Hu, Y.-W. Liu, X. Hu and J.-H. Li, “Anonymous micropayments authentication (AMA) in mobile data network,” INFOCOM 2004, Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, Vol.1, Mar. 2004, pp.46–53.
[9]Z. Huang and K. F. Chen, “Electronic payment in mobile environment,” The Proceeding of 13th International Workshop on Database and Expert Systems Applications, 2002, pp. 345-349.
[10]M.A. Kim, H.K. Lee, S.W. Kim, W.H. Lee, and E.K. Kang, “Implementation of Anonymity-Based e-Payment System for M-Commerce,” IEEE 2002 International Conference on Communication, Circuits and Systems and West Sino Expositions, 2002.
[11]S.Y. Kim, and W.J. Lee, “A PayWord-Based Micropayment Protocol Supporting Multiple Payments,” The 12th International Conference on Computer Communications and Networks, Oct. 2003, pp.609-612.
[12]S. Kim and H. Oh, “An Atomic Micropayment System for a Mobile Computing Environment,” IEICE Trans. Inf.&Syst., Vol.E84-D, Jun. 2001.
[13]K. Martin, B. Preneel, C. Mitchell, H. Hitz, G. Horn, A. Poliakova, and P. Howard, “Secure billing for mobile information services in UMTS,” The Proceeding of IS&N’98, 1998.
[14]S. Matsuo, and W. Ogata, “Electronic Ticket Scheme for ITS,” IEICE Trans. Fundamentals, Vol.E86-A, Jan. 2003.
[15]D. O’Mahony, M. Peirce and H. Tewari, Electronic payment systems for e-commerce, 2nd edition, Artech House, 2001.
[16]NIST, Secure Hash Standard, FIPS 180-1, 1995.
[17]T.P. Pedersen, “Electronic payments of small amounts,” Technical report, Aarhus University, Computer Science Department, Aug. 1995.
[18]R. Rivest, The MD5 message-digest algorithm, RFC 1321, Apr. 1992.
[19]R. Rivest, A. Shamir, Payword and Micromint, MIT Laboratory for Computer Science, May 1996.
[20]M. Sandirigama, A. Shimizu, and M.T. Noda, “Simple and Secure Coin(SAS-Coin)-A Practical Micropayment System” IEICE Trans. Fundamentals, Vol.E83-A, Dec. 2000.
[21]J.A. Senn, “The emergence of m-commerce,” Computer, Vol. 33, Dec. 2000, pp. 148-150.
[22]J.D. Tygar, “Atomicity in electronic commerce,” The Proceeding of 15th ACM Symp. On Principles of Distributed Computing, May 1996, pp.8-26.
[23]C.-T. Wang, C.-C. Chang, and C.-H. Lin, “A New Micro-Payment System using General Payword Chain,” Electronic Commerce Research, No.2, 2002, pp. 159-168.
[24]S. Xu, M. Yung, G. Zhang, and H. Zhu, “Money conservation via atomicity in fair offline e-cash,” The Proceeding of 2nd Int. Workshop on Information Security, LNCS 1729, 1996, pp.14-31.
[25]S.-M. Yen, L.-T. Ho, and C.-Y. Huang, “Internet Micropayment Based on Unbalanced One-way Binary Tree,” The Proceeding of International Workshop on Cryptographic Techniques and E-Commerce, CrypTEC '99, Hong Kong, 5-8 July 1999, pp.155-162.
[26]S.-M. Yen, “PayFair: a prepaid internet ensuring customer fairness micropayment scheme,” The Proceeding of IEE on Computers and Digital Techniques, Vol. 148, pp.207-213, Nov. 2001.
[27]A. Weimerskirch, C. Paar, and S. Chang Shantz “Elliptic Curve Cryptography on a Palm OS Device,” The 6th Australasian Conference on Information Security and Privacy-ACISP 2001, LNCS 2119, 2001, pp.502-513.
[28]Z. Yang, W. Lang and Y. Tan, “A new fair micropayment system based on hash chain,” The Proceeding of the 2004 IEEE Conference on e-Technology, e-Commerce and e-Service (EEE '04), 2004 , pp. 139-145.
[29]B. Cox, J.D. Tygar, and M. Sirbu, “NetBill Security and Transaction Protocol,” http://www.ini.cmu.edu/NETBILL/pubs/Usenix.html, 1995.
[30]EZPay, NEWEB.com, available at http://www.ezpay.com.tw.
[31]M. Manasse, “The Millicent Protocol for Inexpensive Electronic Commerce,” http://www.w3.org/Conferences/WWW4/Papers/246/, 1995.
[32]PayPal. X.com, available at http://www.paypal.com.
|