참고문헌
- ABRAZHEVICH, D. 2001.Classification and characteristics of electronic payment systems. In Electronic Commerce and Web Technologies (Lecture Notes in Computer Science 2115), 81-90.
- ABRAZHEVICH, D. 2004. Electronic Payment Systems: A User-Centered Perspective and Interaction Design. Technische Universiteit Eindhoven, Eindhoven.
- BRESSON, P. AND BUTTERWORTH, C. 2009. IC3 2008 Annual report on internet crime released. http://www.ic3.gov/media/2009/090331.aspx. Acccessed on Feb 20, 2011.
- CHAUM, D. 1983. Blind signatures for untraceable payments. In Advances in Cryptology, Proceedings of Crypto 82. 199-203.
- COX, B., TYGAR, J. D., AND SIRBU, M. 1995. NetBill security and transaction protocol. In Proceedings of the1st USENIX Workshop in Electronic Commerce, 77-88.
- ELECTRONIC PAYMENT EXCHANGE. 2009. Buyer Wall tokenization and encryption for payment processing and PCI compliance. http://www.epx.com/solutions/buyerwall.htm. Acccessed on Feb 22, 2011.
- FREIER, A. O., KARLTON, P., AND KOCHER, P. C. 1996. The SSL protocol version 3.0. http://tools.ietf.org/html/draft-ietf-tls-ssl-version3-00. Acccessed on Feb 22, 2011.
- GLASSMAN, S., MANASSE, M., ABADI, M., GAUTHIER, P., AND SOBALVARRO, P. 1995. The Millicent protocol for inexpensive electronic commerce. In Proceedings of the 4th International World Wide Web Conference, 603-618.
- GONZALEZ, A. G. 2004. PayPal: the legal status of C2C payment systems. Computer Law and Security Report 20, 4, 293-299. https://doi.org/10.1016/S0267-3649(04)00051-2
- KASSLIN, K. AND TIKKANEN, A. 2003. Replay attack on Kerberos V and SMB. http://users.tkk.fi/autikkan/kerberos/docs/phase1/pdf/LATEST_replay_attack.pdf. Acccessed on Feb 22, 2011.
- KENNY, P. 2010. How to use a one time credit card. http://www.streetdirectory.com/travel_guide/149328/credit_cards/how_to_use_a_one_time_credit_card.html. Acccessed on Feb 20, 2011.
- KERNER, S. M. 2009. Black Hat: hacking SSL with sslstrip. http://blog.internetnews.com/skerner/2009/02/black-hat-hacking-ssl-with-ssl.html. Acccessed on Feb 20, 2011.
- LI, Y. AND ZHANG, X. 2005. Securing credit card transactions with one-time payment scheme. Electronic Commerce Research and Applications 4, 4, 413-426. https://doi.org/10.1016/j.elerap.2005.06.002
- MARLINSPIKE, M. 2009. SSLStrip. http://www.thoughtcrime.org/software/sslstrip. Acccessed onFeb 20, 2011.
- MCrypt. http://mcrypt.sourceforge.net. Acccessed on Feb 22, 2011.
- MEDVINSKY, G. AND NEUMAN, B. C. 1993. NetCash: a design for practical electronic currency on the internet. In Proceedings of the 1st ACM Conference on Computer and Communications Security, 102-106.
- MERCHANT LINK. Transaction vault--Remove the data, remove the risk. http://www.merchantlink.com/portal/community/merchant_link/v2.0/restaurant/transactionvault. Acccessed on Feb 22, 2011.
- NEUMAN, B. C. AND MEDVINSKY, G. 1995. Requirements for network payment: the NetCheque perspective. In IEEE Proceedings of Compcon '95 Technologies for the Information Superhighway, Digest of Papers, 32-36.
- NEUMAN, B. C. AND TS'O, T. 1994. Kerberos. an authentication service for computer networks. IEEE Communications Magazine 32, 9, 33-38. https://doi.org/10.1109/35.312841
- OpenSSL project. http://www.openssl.org. Acccessed on Feb 22, 2011.
-
The
$OSCMall^{TM}$ development site. http://www.oscdevshed.com/. Acccessed on Feb 22, 2011. - PayPal. http://www.paypal.com. acccessed on Feb 22, 2011.
- PRIVACY RIGHTS CLEARINGHOUSE. Chronology of data breaches. http://www.privacyrights.org/ar/ChronDataBreaches.htm#2009. Acccessed on Feb 20, 2011.
- RIVEST, R. L. AND SHAMIR, A. 1996. PayWord and MicroMint: two simple micropayment schemes. CryptoBytes 2, 1, 7-11.
- SHAMIR, A. 2002. Secureclick: a web payment system with disposable credit card numbers. In Financial Cryptography (Lecture Notes in Computer Science 2339), P. SYVERSON, Ed. Springer Berlin, Heidelberg, 232-242.
- SHIFT4 CORPORATION. True Security, TrueTokenizationTM. http://www.shift4.com/tokenization.cfm. Acccessed on Feb 22, 2011.
- SORKIN, D. E. 2001. Payment methods for consumer-to-consumer online transactions. Akron Law Review 35, 1, 1-30.
- STONE, B. 2009. Hacking suspect's lawyer criticizes federal prosecutors (New York Times August 19, 2009). http://bits.blogs.nytimes.com/2009/08/19/accused-hackers-lawyer-criticizes-federalprosecutors/. Acccessed on Feb 20, 2011.
- VERSIGN INC. Online payment processing: what you and your customers need to know. https://www.verisign.com/stellent/groups/public/documents/white_paper/001879.pdf. acccessed on Feb 20, 2011.
- VISA INTERNATIONAL AND MASTER CARD INTERNATIONAL. 1997. SET secure electronic transaction specification book 3: Formal protocol definition. http://www.cl.cam.ac.uk/research/security/resources/SET. Accessed on Feb 20, 2011.
- WIKIPEDIA. Chip and PIN (smartcard payment system). http://en.wikipedia.org/wiki/Chip_and_PIN. acccessed on Feb 22, 2011.