1Bolignano D.Towards the Formal Verification of Electronic Commerce Protocols[C].Computer Security Foundations Workshop,1997.10-12.
2Fourati A,Ben Ayed H K,et al.A SET Based Approach to Secure the Payment in Mobile Commerce[C].Proceedings ot the 27th An-nual IEEE Conference on Local Computer Networks,2002.
3Hwang Jing-Jang,Hsueh Sue-Chen.Greater Protection for Credit Card Holders:A Revised SET Protocol[J].Computer Standards & Interfaces,1998,19(1):1-8.
9V.S.Miller.Use of elliptic curves in cryptography[J].Advances in Cryptology-Crypto85,1986,LNCS 218 Springer-Verlag:417-426.
10Christof Paar," Implementation Options for Finite Field Arithmetic for EllipticCurve Cryptosystems," 3rd workshop on Elliptic Curve Cryptography 99,Nov1999.
2Christos Ioannidis,David Pym,Julian Williams.Investments and Tradeoffs in the Economics of Information Security[J].Lecture Notes in Computer Science,2009,5628:148-166.
3Ross Anderson,Tyler Moore.The Economics of Information Security:A Survey and Open Questions[C]//Fourth biannual Conference on the Economics of the Software and Internet Industries,2007:1-27.