Next: About this document
Up: WWW Electronic Commerce and
Previous: Conclusions
References
- 1
-
A. Adl-Tabatabai, G. Langdale, S. Lucco, and R. Wahbe.
Efficient and language-independent mobile programs.
In Proceedings of the 1996 ACM SIGPLAN Symposium on Programming
Language Design and Implementation. ACM Press, May 1996.
- 2
-
Nathaniel Borenstein.
Vulnerability of software based credit card encryption.
At https://fv.com/ccdanger/index.html; see also San Jose
Mercury News, 29 January 1996, ``Program shows ease of stealing credit
information'' by Simpson L. Garfinkel.
- 3
-
Benjamin Cox, J. D. Tygar, and Marvin Sirbu.
NetBill security and transaction protocol.
In Proceedings of the First USENIX Workshop in Electronic
Commerce, pages 77-88, July 1995.
- 4
-
Donald Watts Davies and W. L. Price.
Security for Computer Networks: an Introduction to Data Security
in Teleprocessing and Electronic Funds Transfer, 2nd Edition.
Wiley, 1989.
- 5
-
Drew Dean, Edward W. Felten, and Dan S. Wallach.
Java security: from HotJava to Netscape and beyond.
In Proceedings 1996 IEEE Symposium on Security and Privacy,
pages 190-200, May 1996.
- 6
-
Dorothy Denning.
Cryptography and Data Security.
Addison-Wesley, 1982.
- 7
-
Peter J. Denning.
Computers Under Attack: Intruders, Worms, and Viruses.
ACM Press, New York, N.Y., 1990.
- 8
-
N. Borenstein et al.
Perils and pitfalls of practical cybercommerce: The lessons of First
Virtual's first year.
In Proceedings of Frontiers in Electronic Commerce, October
1995.
- 9
-
Howard Gobioff, Sean Smith, J. D. Tygar, and Bennet Yee.
Smartcards in hostile environments.
In Proceedings of the Second USENIX Workshop on Electronic
Commerce, November 1996.
- 10
-
James Gosling and Henry McGilton.
The Java language environment: A white paper.
Technical report, Sun Microsystems, May 1996.
See also https://www.javasoft.com/doc/
language_environment/.
- 11
-
Mastercard International and Visa International.
Secure Electronic Transaction (SET) Specification, June 1996.
See https://www.visa.com or https://www.mastercard.com.
- 12
-
General Magic.
Telescript technology: The foundation for the electronic marketplace.
Technical report, General Magic, 1996.
See also https://www.genmagic.com/Telescript/
Whitepapers/wp1/whitepaper-1.html.
- 13
-
Peter G. Neumann.
Computer Related Risks.
ACM Press and Addison-Wesley, 1995.
Also see Risks Digests at ftp://ftp.sri.com/risks.
- 14
-
Darren New.
Internet information commerce: The First Virtual approach.
In Proceedings of the First USENIX Workshop in Electronic
Commerce, pages 33-68, July 1995.
- 15
-
Adrian R. D. Norman.
Computer Insecurity.
Chapman and Hall, London, 1983.
- 16
-
Marvin Sirbu and J. D. Tygar.
NetBill: an internet commerce system optimized for network
delivered services.
IEEE Personal Communications, pages 34-39, August 1995.
- 17
-
Ken Thompson.
Reflections on trusting trust.
In Robert L. Ashenhurst and Susan Graham, editors, ACM Turing
Award Lectures, The First Twenty Years, 1966 - 1985, pages 163-170.
Addison-Wesley, 1987.
- 18
-
Bennet Yee and J. D. Tygar.
Secure coprocessors in electronic commerce applications.
In Proceedings of the First USENIX Workshop on Electronic
Commerce, pages 155-170, July 1995.
TOM Comversion
Fri Oct 4 17:27:59 EDT 1996