Credit Card-Based Secure Online Payment

  • Johnny W. Wong
  • Lev Mirlas
  • Weidong Kou
  • Xiaodong Lin


The credit card is a popular payment method for the purchase of goods and services. Traditionally, credit cards are used by buyers to purchase merchandise from brick-and-mortar stores. Transactions are carried out face-to-face. Typically, the merchant first obtains authorization from the credit card company regarding the transaction. If the transaction is authorized, the buyer is asked to sign for the purchase, and a paper receipt stating the terms of the sale will be issued to the buyer. The merchant also verifies that the buyer’s signature matches the cardholder’s signature at the back of the card, and that the card has not expired.


Credit Card Trusted Third Party Payment Method Secure Socket Layer Payment Instrument 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [11.1]
    ] A. O. Freier, P. Karlton, P. C. Kocher: SSL 3.0 protocol specification. Scholar
  2. [11.2]
    ] MasterCard International Incorporated, Visa International. The SET specification. Scholar
  3. [11.3]
    D. Eastlake, B. Boesch, S. Crocker, M. Yesil (1996) CyberCash credit card protocol version 0.8. Internet RFC 1898.Google Scholar
  4. [11.4]
    R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, T. Berners-Lee (1999) Hypertext Transfer Protocol — HTTP/1.1. Internet RFC2616.Google Scholar
  5. [11.5]
    X. Lin, J. W. Wong, W. Kou (2000) Performance analysis of secure web server based on SSL. In: Proceedings of ISW2000, J. Pieprzyk, E. Okamoto, J. Seberry (eds.), LNCS 1975. Springer. Berlin Heidelberg New York, pp. 249–261.Google Scholar
  6. [11.6]
    A. O. Freier, P. Karlton, P. C. Kocher (1996) The SSL protocol version 3. 0. Scholar
  7. [11.7]
    W. Ford, M. Baum (1997) Secure electronic commerce: building the infrastructure for digital signatures and encryption. Prentice-Hall, Englewood Cliffs New York.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Johnny W. Wong
    • 1
  • Lev Mirlas
    • 2
  • Weidong Kou
    • 3
  • Xiaodong Lin
    • 1
  1. 1.University of WaterlooWaterlooCanada
  2. 2.IBM Canada Ltd.MarkhamCanada
  3. 3.University of Hong KongHong KongChina

Personalised recommendations