{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:34:29Z","timestamp":1742996069449,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319590400"},{"type":"electronic","value":"9783319590417"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59041-7_18","type":"book-chapter","created":{"date-parts":[[2017,5,4]],"date-time":"2017-05-04T02:43:06Z","timestamp":1493865786000},"page":"285-299","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["E-Payment Plan: A Conditional Multi-payment Scheme Based on User Personalization and Plan Agreement"],"prefix":"10.1007","author":[{"given":"Ghada","family":"El Haddad","sequence":"first","affiliation":[]},{"given":"Hicham","family":"Hage","sequence":"additional","affiliation":[]},{"given":"Esma","family":"A\u00efmeur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,5]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.csi.2008.04.001","volume":"31","author":"MZ Ashrafi","year":"2009","unstructured":"Ashrafi, M.Z., Ng, S.K.: Privacy-preserving e-payments using one-time payment details. Comput. Stand. Interfaces 31, 321\u2013328 (2009)","journal-title":"Comput. Stand. Interfaces"},{"unstructured":"S.S.E.T. LLC, SET Secure Electronic Transaction Specification, Book 1: Business Description. Version, vol. 1 (2002)","key":"18_CR2"},{"unstructured":"Dixon, C.J., Pinckney, T.: Indicating website reputations during website manipulation of user information. Google Patents (2013)","key":"18_CR3"},{"key":"18_CR4","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.csi.2011.05.007","volume":"34","author":"A Ruiz-Mart\u00ednez","year":"2012","unstructured":"Ruiz-Mart\u00ednez, A., Reverte, \u00d3.C., G\u00f3mez-Skarmeta, A.F.: Payment frameworks for the purchase of electronic products and services. Comput. Stand. Interfaces 34, 80\u201392 (2012)","journal-title":"Comput. Stand. Interfaces"},{"doi-asserted-by":"crossref","unstructured":"Vu, K.-P. L., Proctor, R.W.: User Privacy Concerns for E-Commerce (2016)","key":"18_CR5","DOI":"10.4018\/978-1-4666-9787-4.ch125"},{"unstructured":"Cellary, W., Rykowski, J.: Challenges of smart industries\u2013privacy and payment in Visible versus unseen internet. Gov. Inf. Q. (2015)","key":"18_CR6"},{"key":"18_CR7","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.elerap.2015.08.003","volume":"14","author":"A Ruiz-Mart\u00ednez","year":"2015","unstructured":"Ruiz-Mart\u00ednez, A.: Towards a web payment framework: state-of-the-art and challenges. Electron. Commer. Res. Appl. 14, 345\u2013350 (2015)","journal-title":"Electron. Commer. Res. Appl."},{"key":"18_CR8","first-page":"170","volume":"16","author":"JM Gray","year":"2015","unstructured":"Gray, J.M.: How apple pay coincides with the consumer financial protection act: will apple become a regulated entity. J. High Tech. L. 16, 170 (2015)","journal-title":"J. High Tech. L."},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-662-47854-7_13","volume-title":"Financial Cryptography and Data Security","author":"S Preibusch","year":"2015","unstructured":"Preibusch, S., Peetz, T., Acar, G., Berendt, B.: Purchase details leaked to PayPal. In: B\u00f6hme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 217\u2013226. Springer, Heidelberg (2015). doi:10.1007\/978-3-662-47854-7_13"},{"key":"18_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.im.2015.08.001","volume":"53","author":"G Bansal","year":"2016","unstructured":"Bansal, G., Zahedi, F.M., Gefen, D.: Do context and personality matter? Trust and privacy concerns in disclosing private information online. Inf. Manag. 53, 1\u201321 (2016)","journal-title":"Inf. Manag."},{"key":"18_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2015.11.011","volume":"60","author":"B Carminati","year":"2016","unstructured":"Carminati, B., Ferrari, E., Tran, N.H.: Trustworthy and effective person-to-person payments over multi-hop MANETs. J. Netw. Comput. Appl. 60, 1\u201318 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"1550","DOI":"10.1016\/j.jbusres.2015.01.050","volume":"68","author":"FJ Pascual-Miguel","year":"2015","unstructured":"Pascual-Miguel, F.J., Agudo-Peregrina, \u00c1.F., Chaparro-Pel\u00e1ez, J.: Influences of gender and product type on online purchasing. J. Bus. Res. 68, 1550\u20131556 (2015)","journal-title":"J. Bus. Res."},{"key":"18_CR13","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.compeleceng.2015.08.007","volume":"49","author":"JN Luo","year":"2016","unstructured":"Luo, J.N., Yang, M.H., Huang, S.-Y.: An unlinkable anonymous payment scheme based on near field communication. Comput. Electr. Eng. 49, 198\u2013206 (2016)","journal-title":"Comput. Electr. Eng."},{"key":"18_CR14","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MIC.2014.126","volume":"18","author":"S Turner","year":"2014","unstructured":"Turner, S.: Transport Layer Security. IEEE Internet Comput. 18, 60\u201363 (2014)","journal-title":"IEEE Internet Comput."},{"doi-asserted-by":"crossref","unstructured":"Mu, N., Rui, L., Guo, S., Qiu, X.: Generalized lagrange based resource negotiation mechanism in MANETs. In: 10th International Conference on Network and Service Management (CNSM) and Workshop, pp. 218\u2013223 (2014)","key":"18_CR15","DOI":"10.1109\/CNSM.2014.7014162"},{"key":"18_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.dss.2015.02.012","volume":"73","author":"M Cao","year":"2015","unstructured":"Cao, M., Luo, X., Luo, X.R., Dai, X.: Automated negotiation for e-commerce decision making: a goal deliberated agent architecture for multi-strategy selection. Decis. Support Syst. 73, 1\u201314 (2015)","journal-title":"Decis. Support Syst."},{"key":"18_CR17","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.future.2014.06.002","volume":"45","author":"L Gommans","year":"2015","unstructured":"Gommans, L., Vollbrecht, J., Gommans-de Bruijn, B., de Laat, C.: The service provider group framework: a framework for arranging trust and power to facilitate authorization of network services. Future Gener. Comput. Syst. 45, 176\u2013192 (2015)","journal-title":"Future Gener. Comput. Syst."},{"doi-asserted-by":"crossref","unstructured":"Sureshkumar, V., Anitha, R., Rajamanickam, N., Amin, R.: A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity. Comput. Electr. Eng. (2016)","key":"18_CR18","DOI":"10.1016\/j.compeleceng.2016.07.014"}],"container-title":["Lecture Notes in Business Information Processing","E-Technologies: Embracing the Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59041-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T18:39:08Z","timestamp":1710355148000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-59041-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319590400","9783319590417"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59041-7_18","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"5 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MCETECH","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on E-Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ottawa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mcetech2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mcetech.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}