Playing Lottery on the Internet
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Practical Reasoning about Accountability in Electronic Commerce Protocols
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Formal Verification of the Horn-Preneel Micropayment Protocol
VMCAI 2003 Proceedings of the 4th International Conference on Verification, Model Checking, and Abstract Interpretation
Non-repudiation in SET: Open Issues
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Payments and banking with mobile personal devices
Communications of the ACM - Wireless networking security
Securing on-line credit card payments without disclosing privacy information
Computer Standards & Interfaces
Flaw and modification of the iKP electronic payment protocols
Information Processing Letters
Payment technologies for E-commerce
How to conduct a sealed bargain on the internet
InfoSecu '04 Proceedings of the 3rd international conference on Information security
e-coupons: An Efficient, Secure and Delegable Micro-Payment System
Information Systems Frontiers
Using equivalence-checking to verify robustness to denial of service
Computer Networks: The International Journal of Computer and Telecommunications Networking
Journal of Theoretical and Applied Electronic Commerce Research
Improving authentication of remote card transactions with mobile personal trusted devices
Computer Communications
A methodology for verification of digital items in fair exchange protocols with active trustee
Electronic Commerce Research
A Practical Electronic Payment System for Message Delivery Service in the Mobile Environment
Wireless Personal Communications: An International Journal
Periodical payment model using restricted proxy certificates
ACSC '07 Proceedings of the thirtieth Australasian conference on Computer science - Volume 62
A comparative study of secure electronic transaction mechanisms for e-commerce
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
Distributed architectures for electronic cash schemes: a survey
International Journal of Parallel, Emergent and Distributed Systems
Knowledge Aware Bisimulation and Anonymity
ICCS '09 Proceedings of the 9th International Conference on Computational Science: Part I
An Anonymous Credit Card System
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
Using equivalence-checking to verify robustness to denial of service
Computer Networks: The International Journal of Computer and Telecommunications Networking
Formal analysis of the iKP electronic payment protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
A secure payment protocol for restricted connectivity scenarios in M-commerce
EC-Web'07 Proceedings of the 8th international conference on E-commerce and web technologies
Dynamic virtual credit card numbers
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks
Electronic Commerce Research
Model checking the security of multi-protocol systems
CTS'05 Proceedings of the 2005 international conference on Collaborative technologies and systems
Secrecy and authenticity types for secure distributed messaging
ARSPA-WITS'10 Proceedings of the 2010 joint conference on Automated reasoning for security protocol analysis and issues in the theory of security
AnBx: security protocols design and verification
ARSPA-WITS'10 Proceedings of the 2010 joint conference on Automated reasoning for security protocol analysis and issues in the theory of security
New mobile payment protocol: mobile pay center protocol (MPCP)
ISPACT'10 Proceedings of the 9th WSEAS international conference on Advances in e-activities, information security and privacy
Analyzing iKP security in applied pi calculus
CIS'04 Proceedings of the First international conference on Computational and Information Science
A private and efficient mobile payment protocol
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Tag-KEM/DEM: a new framework for hybrid encryption and a new analysis of kurosawa-desmedt KEM
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs)
Electronic Commerce Research
On secure orders in the presence of faults
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Using admissible interference to detect denial of service vulnerabilities
IWFM'03 Proceedings of the 6th international conference on Formal Methods
Relational-based calculus for trust management in networked services
Computer Communications
Double-spending fast payments in bitcoin
Proceedings of the 2012 ACM conference on Computer and communications security
Hi-index | 0.07 |
This paper discusses the design, implementation, and deployment of a secure and practical payment system for electronic commerce on the Internet. The system is based on the iKP family of protocols-(i=1,2,3)-developed at IBM Research. The protocols implement credit card-based transactions between buyers and merchants while the existing financial network is used for payment clearing and authorization. The protocols are extensible and can be readily applied to other account-based payment models, such as debit cards. They are based on careful and minimal use of public-key cryptography, and can be implemented in either software or hardware. Individual protocols differ in both complexity and degree of security. In addition to being both a precursor and a direct ancestor of the well-known SET standard, iKP-based payment systems have been in continuous operation on the Internet since mid-1996. This longevity-as well as the security and relative simplicity of the underlying mechanisms-makes the iKP experience unique. For this reason, this paper also reports on, and addresses, a number of practical issues arising in the course of implementation and real-world deployment of a secure payment system