{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:00:14Z","timestamp":1725494414537},"publisher-location":"Boston, MA","reference-count":11,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387723662"},{"type":"electronic","value":"9780387723679"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-72367-9_24","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T23:12:08Z","timestamp":1194649928000},"page":"277-288","source":"Crossref","is-referenced-by-count":2,"title":["Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions"],"prefix":"10.1007","author":[{"given":"Alapan","family":"Arnab","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Hutchison","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Arnab, A., AND Hutchison, A. Verifiable digital object identity system. In Proceedings of the Sixth ACM Workshop on Digital Rights Management, Co-Located with ACM CCS 2006, Alexandria, Virginia, USA (2006), K. Kurosawa, R. Safavi-Naini, and M. Yung, Eds., ACM.","DOI":"10.1145\/1179509.1179514"},{"issue":"12","key":"24_CR2","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1145\/953460.953496","volume":"46","author":"A. a. Basu","year":"2003","unstructured":"Basu, A., AND Muylle, S. Authentication in e-commerce. Communications of the ACM 46,12(2003), 159\u2013166. url: http:\/\/www.doi.acm.org\/10J145\/953460.953496 .","journal-title":"Communications of the ACM"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Bella, G., Paulson, L. C, AND Massacci, F. The verification of an industrial payment protocol: the set purchase phase. In CCS\u2019 02: Proceedings of the 9th ACM conference on Computer and communications security (New York, NY, USA, 2002), ACM Press, pp. 12\u201320. url: http:\/\/www.doi.acm.org\/10.1145\/586110.586113 .","DOI":"10.1145\/586110.586113"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Mulligan, D., Han, J., AND Burstein, A. How DRM Based Content Delivery Systems Disrupt Expectations of \u201cPersonal Use\u201d. In Proceedings of the 2003 ACM workshop on Digital Rights Management (2003), ACM, pp. 77\u201389. URL: http:\/\/www.doi.acm.org\/10.1145\/947380.947391 .","DOI":"10.1145\/947390.947391"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Peha, J. M., AND Khamitov, I. M. Paycash: a secure efficient internet payment system. In ICEC\u2019 03: Proceedings of the 5th international conference on Electronic commerce (New York, NY, USA, 2003), ACM Press, pp. 125\u2013130. url: http:\/\/www.doi.acm.org\/10J145\/948005.948022 .","DOI":"10.1145\/948005.948022"},{"key":"24_CR6","unstructured":"Roberts, P. Strong authentication a hard sell for banks. ComputerWorld (02 Nov 2004). URL: http:\/\/www.computerworld.com\/action\/article.do?command=viewArticleBasic&articleId=97133 Last accessed: 05 Aug 2006."},{"key":"24_CR7","unstructured":"Rosencrance, L. Gartner survey sparks debate on internet retail fraud. ComputerWorld (18 July 2000). URL: http:\/\/www.computerworld.com\/action\/article.do?command=viewArticleBasic&articleId=47270 Last accessed: 05 Aug 2006."},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Ruiz, M. C, Cazorla, D., Cuartero, F., AND Pardo, J. J. Analysis of the set e-commerce protocol using a true concurrency process algebra. In SAC\u2019 06: Proceedings of the 2006 ACM symposium on Applied computing (New York, NY, USA, 2006), ACM Press, pp. 879\u2013886. url: http:\/\/www.doi.acm.org\/10.1145\/1141277.1141480 .","DOI":"10.1145\/1141277.1141480"},{"key":"24_CR9","unstructured":"Stallings, W. Network Security Essentials-Applications and Standards, international second ed. Prentice Hall, 2003."},{"issue":"3","key":"24_CR10","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1145\/266231.266239","volume":"5","author":"D. D. Steinauer","year":"1997","unstructured":"Steinauer, D. D., Wakid, S.A., AND Rasberry, S. Trust and traceability in electronic commerce. StandardView 5,3 (1997), 118\u2013124. url: http:\/\/www.doi.acm.Org\/10.l145\/266231.266239 .","journal-title":"StandardView"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Tsai, J. Y., Cranor, L. F., AND Craver, S. Vicarious infringement creates a privacy ceiling. In Proceedings of the Sixth ACM Workshop on Digital Rights Management, CoLocated with ACM CCS 2006, Alexandria, Virginia, USA (2006), K. Kurosawa, R. Safavi-Naini, and M. Yung, Eds., ACM.","DOI":"10.1145\/1179509.1179512"}],"container-title":["IFIP International Federation for Information Processing","New Approaches for Security, Privacy and Trust in Complex Environments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-72367-9_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T08:58:15Z","timestamp":1556960295000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-72367-9_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387723662","9780387723679"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-72367-9_24","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2007]]}}}