期刊文献+

3D安全协议的改进及应用 被引量:2

Improvement and application of 3D secure protocol
下载PDF
导出
摘要 改进3D安全协议,引入支付认证交易码,使得3D安全协议中的3个域间在保护敏感隐私信息的前提下进行安全交易.应用该协议给出跨国跨行网上银行个人转帐模型,表明改进的3D安全协议可在不披露汇款人信用卡号的前提下进行安全转帐,保障了交易中各参与者彼此间的信息隐私,并创新了汇款方式. An improvement on 3D secure protocol is proposed for securing E-commerce transactions. PATV (Payment Authentication Transaction Value) is introduced to protect privacy information in the overall e-business process. An internet banking system of cross-border remittances is demonstrated and integrated with the proposed improved protocol. It shows that remittance transactions can be securely performed without disclosing sender's credit card number information among the members in 3D SET. In addition, a novel way for remittance is provided.
出处 《控制与决策》 EI CSCD 北大核心 2005年第4期463-466,共4页 Control and Decision
基金 国家自然科学基金项目(70372011) 国家"十五"科技攻关计划专题项目(2001BA102A06-09).
关键词 3D安全协议 隐私保护 电子商务 汇款 Data privacy Electronic commerce Information management Internet Network protocols
  • 相关文献

参考文献8

  • 1Ranganathan C, Ahobha Ganapathy. Key dimensions of business-to-customer web sites[J]. Information and Management,2002,39(1):457-465.
  • 2Visa Int Service Association. 3D Secure protocol specification core functions[EB/OL].http://international.visa.com/fb/paytech/secure/main.jsp.2003/2004-01-07.
  • 3Hwang J J, Yeh T C, Li J B. Securing on-line credit card payments without disclosing privacy information[J]. Computer Standards and Interfaces,2003,25(2):119-129.
  • 4Wu X Q, A hybrid approach in intelligent workflow modeling using Petri nets and neural network for inter-organizational cooperation[A]. The 8th Int Conf on CSCW in Design[C].Xiamen,2004:307-311.
  • 5Coffey T, Saidha P. Non-repudiation with mandatory proof of receipt[J]. Computer Communication Review,1996,26(1):6-17.
  • 6Petra van Krugten, Mark Hoogenboom. B2C security-be just secure enough[J].Computers and Security,2000,19(4):348-356.
  • 7Eloy Portillo, Ahmed Patel. Design methodology for secure distributed transactions in electronic commerce[J]. Computer Standards and Interfaces,1999,21(3):5-18.
  • 8Mikael R Jensen, Thomas H Moller, Torben Bach Pedersen, et al. Converting XML DTDs to UML diagrams for conceptual data integration[J]. Data and Knowledge Engineering,2003,44(7):323-346.

同被引文献9

  • 1吴小强,刘晶,朱世朋,周荣喜,邱菀华.基于可信第三方的安全支付认证模型及其应用[J].计算机集成制造系统,2005,11(5):690-695. 被引量:5
  • 2王丹卉,李晖,李林.SET协议和3-D Secure协议的比较与分析[J].计算机应用研究,2005,22(11):114-116. 被引量:3
  • 3SECPay Ltd:3-D secure integration and user guide[R].2006.
  • 4Chaff S,Kermani P,Smith S,et al.Security issues in M-commerce:a usage-based taxonomy[C].Proceedings of E-Commerce Agents,2001:264-282.
  • 5Chang Y,Chang C,Huang H.Digital signature with message recovcry using self-certified public keys without trustworthy system authority[J].Journal of Applied Mathematics and Computation,2005,161(1):211-227.
  • 6Hu Z,Liu Y,Hu X,et al.Anonymous micropayments authentication in mobile data network[C].Proceedings of INFOCOM,2004.
  • 7Chaobo Yang,Ming Qi.Scheme and applications of mobile payment based on 3-D security protocol[C].Proceedings of the 3rd International Conference on Mobile Technology,Applications & Systems,2006.
  • 8李曦,胡汉平.一种安全的移动支付方法[J].计算机应用研究,2008,25(5):1546-1549. 被引量:12
  • 9周典萃,卿斯汉,周展飞.Kailar逻辑的缺陷[J].软件学报,1999,10(12):1238-1245. 被引量:29

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部