CyberCash Credit Card Protocol Version 0.8

نویسندگان

  • Donald E. Eastlake
  • Brian P. Boesch
  • Steve Crocker
  • Magdalena Yesil
چکیده

CyberCash is developing a general payments system for use over the Internet. The structure and communications protocols of version 0.8 are described. This version includes credit card payments only. Additional capabilities are planned for future versions. This document covers only the current CyberCash system which is one of the few operational systems in the rapidly evolving area of Internet payments. CyberCash is committed to the further development of its system and to cooperation with the Internet Engineering Task Force and other standards organizations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

System Design of Raspberry Pi for Radio Frequency Identification and GPS

A real time handheld system design: Raspberry Pi, is a credit card sized single board computer, which was introduced with the intention of promoting the teaching of basic computer science in schools. It is built using ARM11 processor. This project deals with Radio Frequency Identification card for an attendance recorder system for the purpose of maintaining attendance details of the employee an...

متن کامل

Making Sense of Specifications: The Formalization of SET

The last ten years, since the seminal work on the BAN logic [6], have seen the rapid development of formal methods for the analysis of security protocols. But security protocols have also developed rapidly, becoming more and more complex. Protocols for electronic commerce are the béte noir : six pages were enough to describe the Needham-Schroeder protocol in 1978 [15], six hundred pages were no...

متن کامل

Dynamic Multi-Factor Security

This paper identifies the current limitations of electronic remote authentication systems and presents a new remote authentication system that addresses these limitations. Examples of these limitations can be easily observed in everyday life. Some more common examples include: credit card theft, identity theft, insurance fraud and hacking of private computer networks. Our proposed solution incl...

متن کامل

Collusion in a Multi-party Communication Protocol for Anonymous Credit Cards

We proposed in 8] a novel scheme to implement an anonymous credit card that protects privacy while providing the security, record-keeping and charging mechanism of conventional credit cards. The key idea is to use cryptographic techniques to allow two parties to communicate without knowing each other. In this paper, we present a formal method to study collusion in the multi-party communication ...

متن کامل

An analysis of mobile credit card usage intentions

Purpose – Many banks consider mobile-based technologies have improved the banking services through introduction of new banking facilities. One of the latest facilities developed in this area is the “mobile credit card.” The purpose of this study is to examine the factors that determine intention to use mobile credit card among Malaysia bank customers, as their new way in conducting payment tran...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • RFC

دوره 1898  شماره 

صفحات  -

تاریخ انتشار 1996