The verification of an industrial payment protocol: the SET purchase phase
Proceedings of the 9th ACM conference on Computer and communications security
Analysis of the SET e-commerce protocol using a true concurrency process algebra
Proceedings of the 2006 ACM symposium on Applied computing
Security, privacy, and anonymity
Crossroads
IEEE Security and Privacy
Verifying the SET Purchase Protocols
Journal of Automated Reasoning
Analysis of the SSL 3.0 protocol
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Verifying the SET registration protocols
IEEE Journal on Selected Areas in Communications
A novel electronic cash system with trustee-based anonymity revocation from pairing
Electronic Commerce Research and Applications
E-commerce: protecting purchaser privacy to enforce trust
Electronic Commerce Research
Payment frameworks for the purchase of electronic products and services
Computer Standards & Interfaces
Hi-index | 0.00 |
The recent increase in data breaching incidents involving high profile e-commerce companies is alarming as such privacy threats can seriously thwart the healthy growth of electronic commerce. We propose a privacy-preserving e-payment scheme that guarantees authenticity while keeping the customer's sensitive details secret from the respective parties involved in the online transaction. Using a non-reusable password-based authentication approach, the proposed protocol allows consumers to anonymously purchase goods from an online merchant, thus achieving the ideal privacy environment in which to shop. The protocol can be easily deployed in an e-commerce environment without requiring great changes to the current processes.