Check out the new USENIX Web site. next up previous
Next: About this document Up: WWW Electronic Commerce and Previous: Conclusions

References

1
A. Adl-Tabatabai, G. Langdale, S. Lucco, and R. Wahbe. Efficient and language-independent mobile programs. In Proceedings of the 1996 ACM SIGPLAN Symposium on Programming Language Design and Implementation. ACM Press, May 1996.

2
Nathaniel Borenstein. Vulnerability of software based credit card encryption. At https://fv.com/ccdanger/index.html; see also San Jose Mercury News, 29 January 1996, ``Program shows ease of stealing credit information'' by Simpson L. Garfinkel.

3
Benjamin Cox, J. D. Tygar, and Marvin Sirbu. NetBill security and transaction protocol. In Proceedings of the First USENIX Workshop in Electronic Commerce, pages 77-88, July 1995.

4
Donald Watts Davies and W. L. Price. Security for Computer Networks: an Introduction to Data Security in Teleprocessing and Electronic Funds Transfer, 2nd Edition. Wiley, 1989.

5
Drew Dean, Edward W. Felten, and Dan S. Wallach. Java security: from HotJava to Netscape and beyond. In Proceedings 1996 IEEE Symposium on Security and Privacy, pages 190-200, May 1996.

6
Dorothy Denning. Cryptography and Data Security. Addison-Wesley, 1982.

7
Peter J. Denning. Computers Under Attack: Intruders, Worms, and Viruses. ACM Press, New York, N.Y., 1990.

8
N. Borenstein et al. Perils and pitfalls of practical cybercommerce: The lessons of First Virtual's first year. In Proceedings of Frontiers in Electronic Commerce, October 1995.

9
Howard Gobioff, Sean Smith, J. D. Tygar, and Bennet Yee. Smartcards in hostile environments. In Proceedings of the Second USENIX Workshop on Electronic Commerce, November 1996.

10
James Gosling and Henry McGilton. The Java language environment: A white paper. Technical report, Sun Microsystems, May 1996. See also https://www.javasoft.com/doc/
language_environment/
.

11
Mastercard International and Visa International. Secure Electronic Transaction (SET) Specification, June 1996. See https://www.visa.com or https://www.mastercard.com.

12
General Magic. Telescript technology: The foundation for the electronic marketplace. Technical report, General Magic, 1996. See also https://www.genmagic.com/Telescript/
Whitepapers/wp1/whitepaper-1.html.

13
Peter G. Neumann. Computer Related Risks. ACM Press and Addison-Wesley, 1995. Also see Risks Digests at ftp://ftp.sri.com/risks.

14
Darren New. Internet information commerce: The First Virtual approach. In Proceedings of the First USENIX Workshop in Electronic Commerce, pages 33-68, July 1995.

15
Adrian R. D. Norman. Computer Insecurity. Chapman and Hall, London, 1983.

16
Marvin Sirbu and J. D. Tygar. NetBill: an internet commerce system optimized for network delivered services. IEEE Personal Communications, pages 34-39, August 1995.

17
Ken Thompson. Reflections on trusting trust. In Robert L. Ashenhurst and Susan Graham, editors, ACM Turing Award Lectures, The First Twenty Years, 1966 - 1985, pages 163-170. Addison-Wesley, 1987.

18
Bennet Yee and J. D. Tygar. Secure coprocessors in electronic commerce applications. In Proceedings of the First USENIX Workshop on Electronic Commerce, pages 155-170, July 1995.



TOM Comversion
Fri Oct 4 17:27:59 EDT 1996