메뉴 건너뛰기




Volumn 28, Issue 5, 2009, Pages 289-300

Secure multiparty payment with an intermediary entity

Author keywords

Electronic commerce; Electronic payment; Intermediation; Secure multiparty protocol

Indexed keywords

BUSINESS MODELS; CENTRALIZED SYSTEMS; ELECTRONIC PAYMENT; GLOBAL NETWORKS; INTERMEDIATION; PAYMENT PROTOCOLS; SECURE MULTIPARTY PROTOCOL; WORKING MODES;

EID: 67349211491     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2008.12.002     Document Type: Article
Times cited : (11)

References (29)
  • 2
    • 19944376495 scopus 로고    scopus 로고
    • Information assurance for security protocols
    • Elsevier
    • Bella G., and Bistarelli S. Information assurance for security protocols. Computers and Security 24 (2004) 322-333 Elsevier
    • (2004) Computers and Security , vol.24 , pp. 322-333
    • Bella, G.1    Bistarelli, S.2
  • 3
    • 35048902051 scopus 로고    scopus 로고
    • Simulation model for the estimation of timeouts in non-repudiation protocols
    • ICCSA Workshop on Internet Communications Security, May
    • Carbonell M, Onieva J, Lopez J, Zhou J, Galpert D. Simulation model for the estimation of timeouts in non-repudiation protocols. In: ICCSA Workshop on Internet Communications Security, LNCS 3043, May 2004. p. 903-14.
    • (2004) LNCS , vol.3043 , pp. 903-914
    • Carbonell, M.1    Onieva, J.2    Lopez, J.3    Zhou, J.4    Galpert, D.5
  • 4
    • 3042857070 scopus 로고    scopus 로고
    • An English auction scheme in the online transaction environment
    • Elsevier
    • Chen T. An English auction scheme in the online transaction environment. Computers and Security 23 (2004) 389-399 Elsevier
    • (2004) Computers and Security , vol.23 , pp. 389-399
    • Chen, T.1
  • 5
    • 33846371427 scopus 로고    scopus 로고
    • Insider attacks on multi-proxy multi-signature schemes
    • Gou L., and Wang G. Insider attacks on multi-proxy multi-signature schemes. Computers and Electrical Engineering 33 2 (2007) 88-93
    • (2007) Computers and Electrical Engineering , vol.33 , Issue.2 , pp. 88-93
    • Gou, L.1    Wang, G.2
  • 9
    • 67349182768 scopus 로고    scopus 로고
    • Towards a web services and intelligent agents-based negotiation system for B2B eCommerce
    • [accessed 14.07.06]
    • Lau R. Towards a web services and intelligent agents-based negotiation system for B2B eCommerce. Electronic Commerce Research and Applications 14 (2006) [accessed 14.07.06]
    • (2006) Electronic Commerce Research and Applications , vol.14
    • Lau, R.1
  • 11
    • 33645518903 scopus 로고    scopus 로고
    • On automated e-business negotiations: goal, policy, strategy, and plans of decision and action
    • Li H., Su S., and Lam H. On automated e-business negotiations: goal, policy, strategy, and plans of decision and action. Journal of Organizational Computing and Electronic Commerce 16 1 (2006) 1-29
    • (2006) Journal of Organizational Computing and Electronic Commerce , vol.16 , Issue.1 , pp. 1-29
    • Li, H.1    Su, S.2    Lam, H.3
  • 12
    • 0038241111 scopus 로고    scopus 로고
    • Generalization of proxy signature-based on discrete logarithms
    • Lia L., Tzenga S., and Hwang M. Generalization of proxy signature-based on discrete logarithms. Computers and Security 22 3 (2003) 245-255
    • (2003) Computers and Security , vol.22 , Issue.3 , pp. 245-255
    • Lia, L.1    Tzenga, S.2    Hwang, M.3
  • 14
    • 33750322392 scopus 로고    scopus 로고
    • Integrating multi-agent negotiation to resolve constraints in fulfilling supply chain orders
    • Lin F., and Lin Y. Integrating multi-agent negotiation to resolve constraints in fulfilling supply chain orders. Electronic Commerce Research and Applications 5 4 (2006) 313-322
    • (2006) Electronic Commerce Research and Applications , vol.5 , Issue.4 , pp. 313-322
    • Lin, F.1    Lin, Y.2
  • 18
    • 1842528329 scopus 로고    scopus 로고
    • The utility business model and the future of computing services
    • Rappa M. The utility business model and the future of computing services. IBM Systems Journal 43 1 (2004). http://digitalenterprise.org/models/models.html
    • (2004) IBM Systems Journal , vol.43 , Issue.1
    • Rappa, M.1
  • 19
    • 67349241807 scopus 로고    scopus 로고
    • An efficient multiple merchants payment protocol for secure electronic transaction based on purchase consolidation" ISEC 2001
    • Springer-Verlag, Berlin Heidelberg
    • Sans O., and Agnew G. An efficient multiple merchants payment protocol for secure electronic transaction based on purchase consolidation" ISEC 2001. LNCS 2040 (2001), Springer-Verlag, Berlin Heidelberg 1-19
    • (2001) LNCS , vol.2040 , pp. 1-19
    • Sans, O.1    Agnew, G.2
  • 21
    • 47849088421 scopus 로고    scopus 로고
    • An anonymous account-based mobile payment protocol for a restricted connectivity scenario2
    • Téllez J, Sierra J. An anonymous account-based mobile payment protocol for a restricted connectivity scenario2. In: DEXA workshops 2007; 2007. p. 688-92.
    • (2007) DEXA workshops , pp. 688-692
    • Téllez, J.1    Sierra, J.2
  • 23
    • 15744371890 scopus 로고    scopus 로고
    • The concept of security and trust in electronic payments
    • Tsiakis T., and Sthephanides G. The concept of security and trust in electronic payments. Computers and Security 24 1 (2005) 10-15
    • (2005) Computers and Security , vol.24 , Issue.1 , pp. 10-15
    • Tsiakis, T.1    Sthephanides, G.2
  • 26
    • 3342889024 scopus 로고    scopus 로고
    • PumaMart: a parallel and autonomous agents based internet marketplace
    • Wang Y., Tan K., and Ren J. PumaMart: a parallel and autonomous agents based internet marketplace. Electronic Commerce Research and Applications 3 3 (2004) 294-310
    • (2004) Electronic Commerce Research and Applications , vol.3 , Issue.3 , pp. 294-310
    • Wang, Y.1    Tan, K.2    Ren, J.3
  • 27
    • 34648857541 scopus 로고    scopus 로고
    • Hybrid proxy multisignature: a new type multi-party signature
    • Wang Z., Qian H., and Li Z. Hybrid proxy multisignature: a new type multi-party signature. Information Sciences 177 24 (2007) 5638-5650
    • (2007) Information Sciences , vol.177 , Issue.24 , pp. 5638-5650
    • Wang, Z.1    Qian, H.2    Li, Z.3
  • 29
    • 67349164939 scopus 로고    scopus 로고
    • An efficient anonymous proxy signature scheme with provable security
    • [accessed 17.05.08]
    • Yu Y., Xu C., Huang X., and Mu Y. An efficient anonymous proxy signature scheme with provable security. Computer Standards and Interfaces 17 (2008) [accessed 17.05.08]
    • (2008) Computer Standards and Interfaces , vol.17
    • Yu, Y.1    Xu, C.2    Huang, X.3    Mu, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.