E-COMMERCE SECURITY WITH SECURE ELECTRONIC TRANSACTION PROTOCOL : A SURVEY AND IMPLEMENTATION
暂无分享,去创建一个
[1] Supakorn Kungpisdan,et al. A practical framework for mobile set payment , 2003 .
[2] Heiko Schuldt,et al. Automatic generation of reliable e-commerce payment processes , 2000, Proceedings of the First International Conference on Web Information Systems Engineering.
[3] Aifeng Sun. Optimization Study for Lightweight Set Protocol , 2012, 2012 International Conference on Industrial Control and Electronics Engineering.
[4] Lawrence C. Paulson. Verifying the SET Protocol: Overview , 2002, FASec.
[5] Xiuhua Liu,et al. The Study on E-commerce Security Based on ECC and SET , 2011, 2011 Third International Conference on Communications and Mobile Computing.
[6] Joseph G. Tront,et al. E-commerce security issues , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[7] Sujeet Shenoi,et al. Formal analysis of e-commerce protocols , 2001, Proceedings 5th International Symposium on Autonomous Decentralized Systems.
[8] Dieter Gollmann. E-commerce security , 2000 .
[9] Fabio Massacci,et al. Verifying the SET registration protocols , 2003, IEEE J. Sel. Areas Commun..
[10] Godwin J. Udo,et al. Privacy and security concerns as major barriers for e-commerce: a survey study , 2001, Inf. Manag. Comput. Secur..
[11] Wan Liang,et al. Formalizing and Checking SET Protocol Based on TLA , 2010, 2010 International Conference on E-Product E-Service and E-Entertainment.
[12] Shao-ping Chen. Study on a Safe and Efficient Payment Model in E-Commerce , 2008, 2008 International Conference on Advanced Computer Theory and Engineering.
[13] Catherine A. Meadows,et al. A Formal Specification of Requirements for Payment Transactions in the SET Protocol , 1998, Financial Cryptography.
[14] Shiyong Lu,et al. Model checking the secure electronic transaction (SET) protocol , 1999, MASCOTS '99. Proceedings of the Seventh International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.
[15] Chin-Ming Hsu,et al. An online fraud-resistant technology for credit card E-transactions , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.
[16] Kwangjo Kim,et al. Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme , 1999, ICISC.
[17] Zhibing Zhang. E-Commerce Based Agents over P2P Network , 2008, 2008 International Conference on Management of e-Commerce and e-Government.
[18] Zhihua Hu. The Study of E-Commerce Security Protocol , 2011, 2011 International Conference on Intelligence Science and Information Engineering.
[19] Jin-Young Choi,et al. Analyzing the Application of E-Commerce inWireless Network , 2005, Second IEEE International Workshop on Mobile Commerce and Services.
[20] Mohamed Kouta,et al. Modified SET protocol for mobile payment: An empirical analysis , 2010, 2010 2nd International Conference on Software Technology and Engineering.
[21] Linlin Wang,et al. Key Technologies for Security Enhancing of Payment Gateway , 2008, 2008 International Symposium on Electronic Commerce and Security.
[22] M. Carmen Ruiz,et al. A formal specification and performance evaluation of the purchase phase in the SET protocol , 2005, Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC'05).
[23] Xuan Zhang,et al. Implementation of a Suggested E-commerce Model Based on SET Protocol , 2010, 2010 Eighth ACIS International Conference on Software Engineering Research, Management and Applications.
[24] Sridhar P. Nerur,et al. A framework for analyzing e-commerce security , 2002, Inf. Manag. Comput. Secur..
[25] B. Sathish Babu,et al. A Method of Fraud & Intrusion Detection for E-payment Systems in Mobile e-Commerce , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.
[26] Herman Lam,et al. A non-repudiation message transfer protocol for e-commerce , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..
[27] Kian-Lee Tan,et al. A Secure Agent-Mediated Payment Protocol , 2002, ICICS.
[28] Srecko Brlek,et al. A flaw in the electronic commerce protocol SET , 2006, Inf. Process. Lett..
[29] Chung-Ren Ou,et al. SETNR/A: an agent-based secure payment protocol for mobile commerce , 2010, Int. J. Intell. Inf. Database Syst..
[30] Prathamesh Churi,et al. JSSecure: A Secured Encryption Strategy for Payment Gateways in E-Commerce , 2017 .
[31] Xun Yi,et al. Secure Agent-Mediated Mobile Payment , 1998, PRIMA.
[32] A. Sengupta,et al. e-Commerce security — A life cycle approach , 2005 .
[33] Wang Hui,et al. An improved SET protocol payment system , 2010, 2010 International Conference on Computer and Communication Technologies in Agriculture Engineering.
[34] Bing Xu,et al. Research of Session Security Management in E-Commerce System , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.