[1]
Guo Dong Wu. The improvements of SET protocol in the digital pay for commodity trading. Computer Applications and Software (2009).
Google Scholar
[2]
Takaaki Mizukia, Hiroki Shizuyab, Takao Nishizeki. Characterization of optimal key set protocols, Discrete Applied Mathematics (2003).
Google Scholar
[3]
Jing-Jang Hwang, Sue-Chen Hsueh. Greater protection for credit card holders: a revised SET protocol, Computer Standards & Interfaces (1998).
DOI: 10.1016/s0920-5489(97)00003-2
Google Scholar
[4]
S. Brlek, S. Hamadou, J. Mullins. A flaw in the electronic commerce protocol SET, Information Processing Letters (2006).
DOI: 10.1016/j.ipl.2005.10.002
Google Scholar
[5]
Yan Xia Zhang, Jun Ju. SET protocol analysis and improvement, Computer and Digital Engineering (2007).
Google Scholar
[6]
Hong Ye, Zhi Xiang Yuan. Cardholder anonymity analysis in SET protocol, J. of Anhui University of Technology (2010).
Google Scholar
[7]
Li Juan Zhou, Xin Zhuang Wang, Wan Qi Mei. Electronic payment system module design based on SET protocol, Electronic Component Applications (2009).
Google Scholar
[8]
Tao Wu, Jun Chen. Secure electronic transaction process reengineering based on SET protocol, J. of Anhui University of Technology (2008).
Google Scholar