메뉴 건너뛰기




Volumn 18, Issue 4, 2000, Pages 611-627

Design, implementation, and deployment of the iKP secure electronic payment system

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; ELECTRONIC COMMERCE; INTERNET; NETWORK PROTOCOLS;

EID: 0033731024     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/49.839936     Document Type: Article
Times cited : (138)

References (35)
  • 1
    • 0033174376 scopus 로고    scopus 로고
    • Cyber view: How to steal millions in champ change
    • Aug.
    • P. Wallich, "Cyber view: How to steal millions in champ change," Sci. Amer., pp. 32-33, Aug. 1999.
    • (1999) Sci. Amer. , pp. 32-33
    • Wallich, P.1
  • 2
    • 0028532579 scopus 로고
    • Why cryptosystems fail
    • Nov.
    • R. Anderson, "Why cryptosystems fail," Commun. ACM, vol. 37, no. 11, pp. 32-41, Nov. 1991.
    • (1991) Commun. ACM , vol.37 , Issue.11 , pp. 32-41
    • Anderson, R.1
  • 4
    • 0003068282 scopus 로고    scopus 로고
    • Security architecture for the internet protocol
    • Nov.
    • S. Kent and R. Atkinson, "Security architecture for the Internet Protocol,", Internet RFC 2401, Nov. 1998.
    • (1998) Internet RFC 2401
    • Kent, S.1    Atkinson, R.2
  • 6
    • 0031238209 scopus 로고    scopus 로고
    • State of the art in electronic payment systems
    • Sept.
    • N. Asokan, P. Janson, M. Steiner, and M. Waidner, "State of the art in electronic payment systems," IEEE Computer, vol. 30, pp. 28-35, Sept. 1997, .
    • (1997) IEEE Computer , vol.30 , pp. 28-35
    • Asokan, N.1    Janson, P.2    Steiner, M.3    Waidner, M.4
  • 10
    • 0031650188 scopus 로고    scopus 로고
    • Asynchronous protocols for optimistic fair exchange
    • Oakland, CA, May Revised version available, a minor mistake in the proceedings version was fixed
    • N. Asokan, V. Shoup, and M. Waidner, "Asynchronous protocols for optimistic fair exchange," in Proc. IEEE Symp. Res. Security Privacy, Research in Security and Privacy. Oakland, CA, May 1998, Revised version available, a minor mistake in the proceedings version was fixed, pp. 86-99.
    • (1998) Proc. IEEE Symp. Res. Security Privacy, Research in Security and Privacy , pp. 86-99
    • Asokan, N.1    Shoup, V.2    Waidner, M.3
  • 12
    • 0003195066 scopus 로고
    • The MD5 message-digest algorithm
    • Apr.
    • R. Rivest, "The MD5 message-digest algorithm,", Internet RFC 1321, Apr. 1992.
    • (1992) Internet RFC 1321
    • Rivest, R.1
  • 13
    • 0343751658 scopus 로고
    • NIST National Institute of Standards and Technology (computer systems laboratory) secure hash standard
    • Apr.
    • "NIST National Institute of Standards and Technology (Computer Systems laboratory) Secure hash standard," in Federal Information Processing Standards Publication FIPS FUB 180-1, Apr. 1995.
    • (1995) Federal Information Processing Standards Publication FIPS FUB 180-1
  • 14
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • Berlin, Germany: Springer-Verlag, number 1109 in Lecture Notes in Computer Science
    • M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication," in Advances in Cryptology - CRYPTO '96. Berlin, Germany: Springer-Verlag, number 1109 in Lecture Notes in Computer Science, 1996, pp. 1-15.
    • (1996) Advances in Cryptology - CRYPTO '96 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 15
    • 0342446318 scopus 로고    scopus 로고
    • Blinding of credit card numbers in the SET protocol
    • Anguilla, British West Indies: Int. Financial Cryptography Assoc. (IFCA), Feb.
    • H. Krawczyk, "Blinding of credit card numbers in the SET protocol," in Proc. 3rd Conf. Financial Cryptography (FC'99) . Anguilla, British West Indies: Int. Financial Cryptography Assoc. (IFCA), Feb. 1999.
    • (1999) Proc. 3rd Conf. Financial Cryptography (FC'99)
    • Krawczyk, H.1
  • 16
    • 0001868672 scopus 로고
    • Optimal asymmetric encryption - How to encrypt with rsa
    • I. B. Damgard, Ed. Berlin, Germany: Spring-Verlag, Lecture Notes in Computer Science, final (revised) version appeared Nov. 19
    • M. Bellare and P. Rogaway, "Optimal asymmetric encryption - How to encrypt with rsa," in Advances in Cryptology - EUROCRYPT '94, I. B. Damgard, Ed. Berlin, Germany: Spring-Verlag, 1994, Lecture Notes in Computer Science, final (revised) version appeared Nov. 19, 1995, pp. 92-111.
    • (1994) Advances in Cryptology - EUROCRYPT '94 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 17
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably source against adaptive chosen ciphertext attack
    • H. Krawczyk, Ed. Berlin, Germany: Springer-Verlag, no. 1462 Lecture Notes in Computer Science, Aug.
    • R. Cramer and V. Shoup, "A practical public key cryptosystem provably source against adaptive chosen ciphertext attack," in Advances in Cryptology - CRYPTO '98, H. Krawczyk, Ed. Berlin, Germany: Springer-Verlag, no. 1462 Lecture Notes in Computer Science, Aug. 1998, pp. 13-25.
    • (1998) Advances in Cryptology - CRYPTO '98 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 18
    • 50149087559 scopus 로고    scopus 로고
    • Joint electronic payment initiative (jepi)
    • White paper, Apr.
    • E.-S. Chang and D. Dardailler, "Joint electronic payment initiative (jepi)," in JEPI: White paper, Apr. 1997.
    • (1997) JEPI
    • Chang, E.-S.1    Dardailler, D.2
  • 19
    • 0343737853 scopus 로고    scopus 로고
    • Development of a secure electronic marketplace for Europe
    • E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds. Berlin, Germany: Springer-Verlag, no. 1146 in Lecture Notes in Computer Science, also published in: EDI Forum 9/2 (1996) Sept.
    • M. Waidner, "Development of a secure electronic marketplace for Europe," in in Proc. 4th European Symp. Res. Computer Science, E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds. Berlin, Germany: Springer-Verlag, no. 1146 in Lecture Notes in Computer Science, also published in: EDI Forum 9/2 (1996) 98-106, se also http://www.semper.org, Sept. 1996.
    • (1996) Proc. 4th European Symp. Res. Computer Science , pp. 98-106
    • Waidner, M.1
  • 21
    • 71849087704 scopus 로고    scopus 로고
    • Public-key cryptography and password protocols
    • S. Halevi and H. Krawczyk, "Public-key cryptography and password protocols," in ACM Trans. Inform. Syst. Security, vol. 2, 1999, Preliminary version in Proc. 5th ACM Conf. Computer Commun. Security, 1998, pp. 122-131., pp. 25-60.
    • (1999) ACM Trans. Inform. Syst. Security , vol.2
    • Halevi, S.1    Krawczyk, H.2
  • 22
    • 0032218224 scopus 로고    scopus 로고
    • S. Halevi and H. Krawczyk, "Public-key cryptography and password protocols," in ACM Trans. Inform. Syst. Security, vol. 2, 1999, Preliminary version in Proc. 5th ACM Conf. Computer Commun. Security, 1998, pp. 122-131., pp. 25-60.
    • (1998) Proc. 5th ACM Conf. Computer Commun. Security , pp. 122-131
  • 28
    • 0342880857 scopus 로고    scopus 로고
    • Zürich iKP prototype: Protocol specification document
    • Feb.
    • G. Tsudik, "Zürich iKP prototype: Protocol specification document," in IBM Res.: Res. Rep. RZ 2792, Feb. 1996.
    • (1996) IBM Res.: Res. Rep. RZ 2792
    • Tsudik, G.1
  • 32
    • 85084163550 scopus 로고
    • Design and implementation of modular key management protocol and IP secure tunnel on AIX
    • Salt Lake City, UT, June
    • P. Chen, J. Garay, A. Herzberg, and H. Krawcczyk, "Design and implementation of modular key management protocol and IP Secure Tunnel on AIX," in Proc. 5th USENIX UNIX Security Symp., Salt Lake City, UT, June 1995.
    • (1995) Proc. 5th USENIX UNIX Security Symp.
    • Chen, P.1    Garay, J.2    Herzberg, A.3    Krawcczyk, H.4
  • 33
    • 0000416796 scopus 로고    scopus 로고
    • Optimistic fair exchange of digital signatures
    • K. Nyberg, Ed. Berlin, Germany: Springer-Verlag, number 1403 in Lecture Notes in Computer Science
    • N. Asokan, V. Shoup, and M. Waidner, "Optimistic fair exchange of digital signatures," in Advances in Cryptology - EUROCRYPT '98, K. Nyberg, Ed. Berlin, Germany: Springer-Verlag, number 1403 in Lecture Notes in Computer Science, 1998.
    • (1998) Advances in Cryptology - EUROCRYPT '98
    • Asokan, N.1    Shoup, V.2    Waidner, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.