Finally I has carried on profound analysis and comparison in the fourth chapter to the bank card on-line payment safe authentication pattern, has analyzed bank card on-line payment standard 3-D Secure and Secure Code which are promoted by Visa and MasterCard respectively, has analyzed two kind of authentication patterns in the domestic, they are bank payment gateway and the third party payment gateway,and has given a detailed elaboration and analysis to every transaction flow respectively.
HermitFS uses strong cryptography algorithms and a secure protocol to secure the data from the time it is written to the time an authorized user accesses it.
Various optimizations in the Canetti-Krawczyk model for secure protocol design are proven to preserve security.
A secure protocol for the oblivious transfer (extended abstract)
These results hold both for the case of general composition (where a secure protocol is run many times concurrently with arbitrary other protocols) and self-composition (where a single secure protocol is run many times concurrently).
The definition of a secure protocol is considered, and desirable characteristics of secure protocols are discussed.
The paper briefly introduces SET protocol and 3-D Secure protocol,the card payment criterions for on-line transaction.These two protocols are compared and analyzed mainly in security.The results show that 3-D secure protocol reduces complex encryption technology used in SET protocol,so it is weaker in security,thus a scheme is proposed to strengthen it.