Inhaltsverzeichnis Kapitel 1 Kapitel 2 Kapitel 3 Kapitel 4 Kapitel 5 Kapitel 6 Literaturverzeichnis
CAFE - Conditional Access for Europe, http://www.semper.org/sirene/projects/cafe/index.html | |||||||||
D. Chaum: Achieving Electronic Privacy, Scientific American, p. 96-101, August 1992, http://netbase.t0.or.at/crypto/chaumcry.htm | |||||||||
Prof. Dr. V. Claus, Dr. A. Schwill: Duden Informatik, Dudenverlag, 1993. | |||||||||
E-Cash - Blind signatures in online payment systems, http://www.ecashtechnologies.com | |||||||||
A. O. Freier, P. Karlton, P. C. Kocher: The SSL Protocol Version 3.0, Internet Draft. 1996, http://home.netscape.com/eng/ssl3/ssl-toc.html | |||||||||
Home Banking Computer Interface Spezifikation, 1999, http://www.hbci-zka.de/spezifikation/2.html | |||||||||
J. A. Illik: Electronic Commerce, R. Oldenbourg Verlag, 1999. | |||||||||
Gunter Lepschies: E-Commerce und Hackerschutz, Vieweg Verlag, 1999. | |||||||||
MasterCard SET Demonstration, http://www.mastercard.com/shoponline/set/demo.html | |||||||||
DevEdge Online Documentation | |||||||||
| |||||||||
Netscape Communications Corporation, 1998. | |||||||||
Neworder - the resource for people to help avoid being hacked, security and exploiting related files and links, http://neworder.box.sk | |||||||||
E. Rescorla and A. Schiffman: The Secure Hypertext Transfer Protocol, Internet Draft, 1996, http://www.terisa.com/shttp/current.txt | |||||||||
Bruce Schneier: Angewandte Kryptographie, Addison-Wesley Verlag, 1996. | |||||||||
SET - Proposed standard for creditcard-based payment systems | |||||||||
| |||||||||
Gesetz zur digitalen Signatur (Signaturgesetz - SigG), 1997, http://www.iid.de/rahmen/iukdgbt.html#a3 | |||||||||
Andrew S. Tanenbaum: Computernetzwerke, Prentice Hall, 1998. | |||||||||
Inhaltsverzeichnis Kapitel 1 Kapitel 2 Kapitel 3 Kapitel 4 Kapitel 5 Kapitel 6 Literaturverzeichnis