{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:48:18Z","timestamp":1742928498221,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319393803"},{"type":"electronic","value":"9783319393810"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39381-0_8","type":"book-chapter","created":{"date-parts":[[2016,6,20]],"date-time":"2016-06-20T19:33:05Z","timestamp":1466451185000},"page":"77-88","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Secure Communication Protocol Between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks"],"prefix":"10.1007","author":[{"given":"Takashi","family":"Tsuchiya","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Masahiro","family":"Fujita","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kenta","family":"Takahashi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Takehisa","family":"Kato","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fumihiko","family":"Magata","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yoshimi","family":"Teshigawara","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ryoichi","family":"Sasaki","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Masakatsu","family":"Nishigaki","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,6,21]]},"reference":[{"key":"8_CR1","unstructured":"Online banking users suffer \u00a51.4 billion in damage. \n                      http:\/\/www.japantimes.co.jp\/news\/2014\/01\/30\/national\/online-banking-users-suffer-1-4-billion-in-damage\/#.VriNThiLS00"},{"key":"8_CR2","unstructured":"Bank of Taiwan. \n                      http:\/\/www.bot.com.tw\/English\/BankServices\/ElectronicBankingServices\/BOTSSLInternetBanking\/Pages\/default.aspx"},{"key":"8_CR3","unstructured":"Bank of America. \n                      https:\/\/www.bankofamerica.com\/onlinebanking\/online-banking-security-faqs.go"},{"key":"8_CR4","unstructured":"Man-in-the-Browser (MitB). \n                      https:\/\/www.trusteer.com\/en\/glossary\/man-in-the-browser-mitb"},{"key":"8_CR5","unstructured":"Man In The Browser attacks scare banking world. \n                      http:\/\/securityaffairs.co\/wordpress\/17538\/cyber-crime\/man-browser-attacks-scare-banking.html"},{"key":"8_CR6","unstructured":"The Official CAPTCHA Site. \n                      http:\/\/www.captcha.net"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Yan, J., Ahmad, A.S.E.: Breaking visual CAPTCHAs with na\u00efve pattern recognition algorithms. In: 2007 Computer Security Applications Conference, pp. 279\u2013291 (2007)","DOI":"10.1109\/ACSAC.2007.47"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Golle, P.: Machine learning attacks against the ASIRRA CAPTCHA. In: 2008 ACM CSS, pp. 535\u2013542 (2008)","DOI":"10.1145\/1455770.1455838"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Ross, S.A., Alex Halderman, J., Finkelstein, A.: Sketcha: A captcha based on line drawings of 3D models. In: Proceedings of the 19th International Conference on World Wide Web, pp. 821\u2013830 (2010)","DOI":"10.1145\/1772690.1772774"},{"key":"8_CR10","unstructured":"PhishWall. \n                      http:\/\/www.securebrain.co.jp\/eng\/web\/phishwall.php"},{"key":"8_CR11","unstructured":"Symantec White Paper - Banking Trojans. \n                      https:\/\/www4.symantec.com\/mktginfo\/whitepaper\/user_authentication\/21195180_WP_GA_BankingTrojansImpactandDefendAgainstTrojanFraud_062611.pdf"},{"key":"8_CR12","unstructured":"SafeNet eToken 3500. \n                      http:\/\/www.pronew.com.tw\/download\/doc\/eToken3500_PB_(EN)_web.pdf"},{"issue":"12","key":"8_CR13","first-page":"1","volume":"3","author":"A Saisudheer","year":"2013","unstructured":"Saisudheer, A.: M. TECH: smart phone as software token for generating digital signature code for signing in online banking transaction. IJCES 3(12), 1\u20134 (2013)","journal-title":"IJCES"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39381-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T14:48:51Z","timestamp":1596120531000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39381-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319393803","9783319393810"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39381-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"21 June 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}