{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:40:07Z","timestamp":1751496007668,"version":"3.41.0"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030773915"},{"type":"electronic","value":"9783030773922"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-77392-2_8","type":"book-chapter","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T23:06:05Z","timestamp":1625267165000},"page":"103-119","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment Services"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8678-6312","authenticated-orcid":false,"given":"Daniel","family":"Wilusz","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1276-0915","authenticated-orcid":false,"given":"Adam","family":"W\u00f3jtowicz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","unstructured":"Adams, C.: Certificate revocation. In: van Tilborg H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security. Springer, Boston, MA (2011). https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_71","DOI":"10.1007\/978-1-4419-5906-5_71"},{"key":"8_CR2","doi-asserted-by":"publisher","unstructured":"Brose, G.: Password. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security. Springer, Boston, MA (2011). https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_213","DOI":"10.1007\/978-1-4419-5906-5_213"},{"key":"8_CR3","doi-asserted-by":"publisher","unstructured":"Brose, G.: Rainbow tables. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security. Springer, Boston, MA (2011). https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_219","DOI":"10.1007\/978-1-4419-5906-5_219"},{"key":"8_CR4","doi-asserted-by":"publisher","unstructured":"Cimato, S., Sassi, R., Scotti, F.: Biometric privacy. In: Jajodia, S., Samarati, P., Yung, M. (eds.) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-642-27739-9_734-2","DOI":"10.1007\/978-3-642-27739-9_734-2"},{"key":"8_CR5","doi-asserted-by":"publisher","unstructured":"De Soete, M.: PKI. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security. Springer, Boston, MA (2011). https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_301","DOI":"10.1007\/978-1-4419-5906-5_301"},{"key":"8_CR6","unstructured":"Fido Alliance: How FIDO Works? https:\/\/fidoalliance.org\/how-fido-works\/"},{"key":"8_CR7","unstructured":"Garreau, M.: Ethereum 201: Mnemonics (2020). https:\/\/wolovim.medium.com\/ethereum-201-mnemonics-bb01a9108c38"},{"key":"8_CR8","doi-asserted-by":"publisher","unstructured":"Gomez-Barrero, M.: Finger vein. In: Jajodia, S., Samarati, P., Yung, M. (eds.) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-642-27739-9_1487-1","DOI":"10.1007\/978-3-642-27739-9_1487-1"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-642-19228-9_7","volume-title":"Open Research Problems in Network Security","author":"L Jordaan","year":"2011","unstructured":"Jordaan, L., von Solms, B.: A biometrics-based solution to combat SIM swap fraud. In: Camenisch, Jan, Kisimov, Valentin, Dubovitskaya, Maria (eds.) iNetSec 2010. LNCS, vol. 6555, pp. 70\u201387. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19228-9_7"},{"issue":"8","key":"8_CR10","first-page":"473","volume":"64","author":"Y Kaga","year":"2015","unstructured":"Kaga, Y., Matsuda, Y., Takahashi, K., Nagasaka, A.: Biometric authentication platform for a safe, secure, and convenient society. Hitachi Rev. 64(8), 473 (2015)","journal-title":"Hitachi Rev."},{"key":"8_CR11","doi-asserted-by":"publisher","unstructured":"Laerte, P., Holtz, M., David, B., Deus, F., de Sousa Junior, R.: A formal classification of internet banking attacks and vulnerabilities. Int. J. Comput. Sci. Inf. Technol. 3 (2011). https:\/\/doi.org\/10.5121\/ijcsit.2011.3113","DOI":"10.5121\/ijcsit.2011.3113"},{"key":"8_CR12","unstructured":"Laudon, K.C., Traver, C.G.: E-commerce: Business, Technology, Society. Pearson, London (2016)"},{"issue":"1","key":"8_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-019-0018-8","volume":"1","author":"S Latvala","year":"2019","unstructured":"Latvala, S., Sethi, M., Aura, T.: evaluation of out-of-band channels for IoT security. SN Comput. Sci. 1(1), 1\u201317 (2019). https:\/\/doi.org\/10.1007\/s42979-019-0018-8","journal-title":"SN Comput. Sci."},{"key":"8_CR14","unstructured":"Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC press, Boca Raton (2001)"},{"key":"8_CR15","unstructured":"Mourouzis, T., Wojcik, M., Komninos, N.: On the security evaluation of partial password implementations. arXiv preprint arXiv:1701.00104 (2016)"},{"key":"8_CR16","unstructured":"OWASP: Multifactor Authentication Cheat Sheet. https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Multifactor_Authentication_Cheat_Sheet.html"},{"key":"8_CR17","unstructured":"OWASP: Password Storage Cheat Sheet. https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Password_Storage_Cheat_Sheet.html"},{"key":"8_CR18","unstructured":"OWASP: Transaction Authorization Cheat Sheet. https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Transaction_Authorization_Cheat_Sheet.html"},{"key":"8_CR19","doi-asserted-by":"publisher","unstructured":"Paar, C., Pelzl, J.: Key establishment. In: Understanding Cryptography. Springer, Berlin (2010). https:\/\/doi.org\/10.1007\/978-3-642-04101-3_13","DOI":"10.1007\/978-3-642-04101-3_13"},{"key":"8_CR20","unstructured":"PCMag, virtual keyboard. https:\/\/www.pcmag.com\/encyclopedia\/term\/virtual-keyboard"},{"key":"8_CR21","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1186\/1687-417X-2011-3","volume":"2011","author":"C Rathgeb","year":"2011","unstructured":"Rathgeb, C., Uhl, A.: A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Info. Secur. 2011, 3 (2011). https:\/\/doi.org\/10.1186\/1687-417X-2011-3","journal-title":"EURASIP J. Info. Secur."},{"key":"8_CR22","doi-asserted-by":"publisher","unstructured":"Rayes, M.O.: One-time password. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security. Springer, Boston, MA (2011). https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_785","DOI":"10.1007\/978-1-4419-5906-5_785"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Rosenberg, B. (ed.): Handbook of financial cryptography and security. CRC Press, Boca Raton (2010)","DOI":"10.1201\/9781420059823"},{"key":"8_CR24","unstructured":"Rusnak, P.: Mnemonic code for generating deterministic keys (2013). https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0039.mediawiki"},{"key":"8_CR25","doi-asserted-by":"publisher","unstructured":"Sako, K.: Digital signature schemes. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security. Springer, Boston, MA (2011). https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_17","DOI":"10.1007\/978-1-4419-5906-5_17"},{"key":"8_CR26","unstructured":"Scholarpedia, Cancelable biometrics. https:\/\/www.scholarpedia.org\/article\/Cancelable_biometrics"},{"key":"8_CR27","doi-asserted-by":"publisher","unstructured":"Smith, S.W.: Secure coprocessor. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security. Springer, Boston, MA (2011). https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_495","DOI":"10.1007\/978-1-4419-5906-5_495"},{"key":"8_CR28","doi-asserted-by":"publisher","unstructured":"Sustek, L.: Hardware security module. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security. Springer, Boston, MA (2011). https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_509","DOI":"10.1007\/978-1-4419-5906-5_509"},{"key":"8_CR29","doi-asserted-by":"publisher","unstructured":"Uhl, A., Rathgeb, C.: Biometric encryption. In: Jajodia, S., Samarati, P., Yung, M. (eds.) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin (2021). https:\/\/doi.org\/10.1007\/978-3-642-27739-9_1519-1","DOI":"10.1007\/978-3-642-27739-9_1519-1"},{"key":"8_CR30","doi-asserted-by":"publisher","unstructured":"Wilusz, D., W\u00f3jtowicz, A.: Securing cryptoasset insurance services with multisignatures. In: Herrero, \u00c1., et al. (eds.) 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020). Advances in Intelligent Systems and Computing, vol. 1267. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-57805-3_4","DOI":"10.1007\/978-3-030-57805-3_4"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"W\u00f3jtowicz, A., Cellary, W.: New challenges for user privacy in cyberspace. Human-computer interaction and cybersecurity handbook, pp. 77\u201396. Taylor & Francis Group, Boca Raton (2019)","DOI":"10.1201\/b22142-4"},{"key":"8_CR32","doi-asserted-by":"publisher","unstructured":"W\u00f3jtowicz, A., Chmielewski J.: Technical feasibility of context-aware passive payment authorization for physical points of sale. In: Personal and Ubiquitous Computing, vol. 21, issue 6, pp. 1113\u20131125. Springer London (2017). https:\/\/doi.org\/10.1007\/s00779-017-1035-z,","DOI":"10.1007\/s00779-017-1035-z"},{"key":"8_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1007\/978-3-642-38631-2_71","volume-title":"Network and System Security","author":"W Yang","year":"2013","unstructured":"Yang, W., Hu, J., Wang, S.: A finger-vein based cancellable bio-cryptosystem. In: Lopez, Javier, Huang, Xinyi, Sandhu, Ravi (eds.) NSS 2013. LNCS, vol. 7873, pp. 784\u2013790. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38631-2_71"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-77392-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:11:22Z","timestamp":1751494282000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-77392-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030773915","9783030773922"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-77392-2_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}