References
- N. Asokan, P. Janson, M. Steiner and M. Waidner, State of the Art in Electronic Payment Systems, IEEE Computer Magazine, September, v. 30, n. 9, pp. 28-35, 1997 https://doi.org/10.1109/2.612244
- A. Herzberg, Safeguarding Digital Library Contents, D-Lib Magazine, January, 1998, ISDN 1082-9873
- Micro-Payments based on iKP, Ralf Hauser, Michael Steiner and Michael Waidner, IBM Research, 12 February 1996, Research Report 2791 (\# 89269), presented at SECURICOM96
- R. Anderson, C. Manifavas and C. Sutherland, NetCard - A Practical Electronic Cash System, Proc. Security Protocol Workshop, LNCS. 1189, pp. 49-57, 1997
- R.L. Rivest and A. Shamir, PayWord and MicroMint--Two Simple Micropayment Schemes, presented at RSA Security conference, 1996
- T. Pederson, Electronic Payments for Small Amounts, Proc. Security Protocol Workshop, LNCS. 1189, pp. 59-68, 1997
- Phillip M. Hallam-Baker, Micro Payment Transfer Protocol(MPTP), W3C Working Draft WD-mptp-951122 (22-Nov-95). at http://www.w3.org/TR/WD-mptp
- Cliff Newman and G. Medvinsky, Requirements for Network Payment: the Netcheque Perspective, Proc. of the IEEE Compcon'95, March 1995 https://doi.org/10.1109/CMPCON.1995.512360
- S. Classman, M. Manasse, M. Abadi, P. Gauthier, and P. Sobalvarro, The Millicent Protocol for Inexpensive Electronic Commerce. In World Wide Web Journal, Fourth International World Wide Web Conference Proceedings, pages 603-618. O'Reilly, December 1995
- Benjamin Cox, J. D. Tygar and Marvin Sirbu, NetBill Security and Transaction Protocol, in Proceedings of the First USENIX Workshop on Electronic Commerce, 1995
- Amir Herzberg and Hilik Yochai, Mini-Pay : Charging per Click on the Web, IBM Research. at http://www.hrl.il.ibm.com/mpay/docs/papers/mpay
- N. M. Haller. The S/KEY one-time password system, In ISOC, 1994
- You are interested in: Electronic commerce, payment systems, and security, at http://www.semper.org/sirene/outsideworld/ecommerce.html
- Digicash homepage at http://www.digicash.com
- G. Medvinsky and C. Newman, NetCash: A design for practical electronic currency on the internet, Proceedings of the First Annual Conference on Computer and Communications Security, 1993
- Secure Electronic Transactions, MasterCard and VISA, at http://www.mastercard.com/set/
- M. Bellare, J.A. Garay, R. Hauser, A. Herzberg, H. Krawczyk, M. Steiner, G. Tsudik, M. Waidner, iKP - A Family of Secure Electronic Payment Protocols, 1st USENIX Workshop on Electronic Commerce, 1995
- R. L. Rivest, A. Shamir and L. M. Adleman, A Method for Obtaining Digital Signature and Public Key Cryptosystems, Communications of the ACM, v. 21, n. 2, pp. 120-126, Feb. 1978 https://doi.org/10.1145/359340.359342
- National Institute for Standard and Technology(NIST), Digital Signature Standard (DSS), FIPS 186, Nov 1994
- Public Key Infrastructure(X.509), at http://www.ietf.org/html.charters/pkix-charter.html
- PGP(Pretty Good Privacy) http://thegate.gamers.org/~tony/pgp.html
- B. Schneier, Applied Cryptography(Second Edition), John Wiley & Sons, 1996
- A. J. Menezes, P. C. Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997
- National Institute for Standard and Technology (NIST), Secure Hash Standard (SHS), FIPS 180-1, Apr. 1995
- R. L. Rivest, The MD5 message-digest algorithm. Internet Request for Comments, RFC 1321, Apr. 1992
- M. Bellare, R. Canetti, and H. Krawczyk, Keying Hash Functions for Message Authentication, Advances in Cryptology - CRYPTO' 96, LNCS 1109, 1996
- L. Lamport, Password Authentication with Insecure Communication, CACM, v. 24, n.11. pp. 770-772, 1981 https://doi.org/10.1145/358790.358797
- M. Burrows, M. Abadi, and R. Needham, A logic of Authentication, DEC SRC report #39, Digital Equipment Cooperation, Palo Alto, CA. Feb. 1989. Revised Feb.1990
- D. Tygar, Atomicity in Electronic Commerce. In Internet Besieged. Addison-Wesley and ACM Press. October 1997, pages 389-406
- R. Kailar, Accountability in Electronic Commerce Protocols, IEEE.Transactions on Software Engineering, v. 22, n. 5, pp. 313-328, 1996 https://doi.org/10.1109/32.502224
- N. Asokan, E. Van Herreweghen, and M. Steiner. Towards a framework for handling disputes in payment systems. Research Report RZ 2996, IBM Research, March 1998
- A. O. Freier, P. Karlton, and P. C. Kocher, The SSL Protocol Ver. 3.0, Netscape Communication Corporation. March 1996
- T. Dierks and C. Allen, The tls protocol version 1.0, RFC 2246, January 1999
- Seong-Min Hong, Jun-Bum Shin, H.Lee-Kwang and Hyunsoo Yoon, 'A new approach to server-aided secret computation', International Conference on Information Security and cryptology, Seoul, 1998
- E. F. Brickell, D. M. Gordon, K. S. Mccurley, and D. B. Wilson, 'Fast exponentiation with precomputation', Advances in Cryptography - EUROCRYPT'92(LNCS 658), pp. 200-207, 1993
- J. G. Steiner, B. C. Newman, and J. I. Schiller.Kerberos: An authentication service for open network systems, Proceedings of the Winter 1988 Usenix Conference, 1988, pages 191-201
- T. Okamoto and K. Ohta, Universal Electronic Cash. In Advances in Cryptology-Crypto'91, pages 324-337. Springer-Verlag, 1992
- T. Eng and T. Okamoto, Single-Term Divisible Electronic Coins, in Pre-Proceedings of Eurocrypt'94, pages 313-323. Springer-Verlag, 1994 https://doi.org/10.1007/BFb0053446
- T. Okamoto, An Efficient Divisible Electronic Cash Scheme, in Advances in Cryptology-Crypto'95, pages 438- 451. Springer-Verlag, 1995
- D. Chaum, A. Fiat, and M. Noar. Untraceable Electronic Cash, In Advances in Cryptology-Crypto'88, pages 319-327. Springer-Verlag,1990