References
- 통계청 서비스업 통계과, '전자상거래통계조사결과 (2002년 1월 사이버 쇼핑몰 조사-B2C),' http://www.nso.go.kr/report/data/suec0201.htm, 2002
- 신철균, '<열린마당> 전자결제 보안 구멍', 전자신문, 2001
- N. Asokan, Phillipe A., Janson, Michael Steiner and Michael Waidner, 'State of the Art in Electronic Payment Systems,' IEEE Computer, Vol.30, No.9, pp.28-35, 1997 https://doi.org/10.1109/2.612244
- Mondex, http://www.mondex.com/
- Proton, http://www.element.be/
- Visa cash, http://international.visa.com/
- eCash, http://www.ecashtechnologies.com/
- Milicent, http://www.milicent.digital.com/
- SET Secure Electronic Transaction LLC, http://www.setco.org/set_specification.html
- CyberCash, http://www.cybercash.com/
- L. H. Stein, E. A. Stefferud, N. S. Borenstein, and M. T. Rose, 'The green commerce model,' Technical report, First Virtual Holdings Incorporated, http://www.fv.com/tech/greenmodel.html, October, 1994
- Echecks, http://www.echeck.org/
- NetCheque, http://www.isi.edu/gost/info/NetCheque/
- http://www.cdcash.co.kr/index.asp
- Neil M Haller, 'The S/KEY One-Time Password System,' Proceedings of the ISOC Symposium on Network and Distributed System Security, San Diego, CA, February, 1994
- http://pgweb.dacom.co.kr/ECREDIT/
- R. L. Rivest, A. Sharmir, L. Adleman, 'A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,' Communications of the ACM, Vol.21, No.2, pp.120-126, Feb., 1978 https://doi.org/10.1145/359340.359342
- http://www.rootca.or.kr
- http://www.ehanvit.co.kr/
- http://www.paypal.com/
- RSA Laboratories, 'PKCS #7 Cryptographic Message Syntax Standard Version 1.5,' Technical Note Version 1.5, Revised November, 1993
- Adams, Cain, Pinkas, Zuccherato, 'Internet X.509 Public Key Infra-structure, Time Stamp Protocol(TSP),' draft-ietf-pkix-time-stamp-12, Internet-Draft, 2000
- ISO/IEC JTC1/SC27 N2107, 'Guidelines on the use and management of Time Stamping Services(GUMTSS),' 1998
- C. Adams, P. Cain, D. Pinkas, R. Zuccherato, 'Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP),' ftp://ftp.rfc-editor.org/in-notes/rfc3161.txt, August, 2001
- http://www.timestamp.co.kr/
- L. R. Knudsen, X. Lai, and B. Preneel, 'Attacks on fast double block length hash functions,' Journal of Cryptology, Vol. 11, No.1, pp.59-72, Winter, 1998 https://doi.org/10.1007/s001459900035
- Douglas R. Stinson, 'Cryptography theory and practice,' pp.233, CRC press, 1995