{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:34:34Z","timestamp":1759091674771,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319651262"},{"type":"electronic","value":"9783319651279"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65127-9_13","type":"book-chapter","created":{"date-parts":[[2017,8,5]],"date-time":"2017-08-05T03:35:53Z","timestamp":1501904153000},"page":"158-170","source":"Crossref","is-referenced-by-count":3,"title":["Cardholder\u2019s Reputation System for Contextual Risk Management in Payment Transactions"],"prefix":"10.1007","author":[{"given":"Albert","family":"Sitek","sequence":"first","affiliation":[]},{"given":"Zbigniew","family":"Kotulski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,6]]},"reference":[{"key":"13_CR1","unstructured":"Department of Payment System, National Bank of Poland: Information about payment cards 2nd quarter 2016 (2016). (in Polish)"},{"key":"13_CR2","unstructured":"EMVCo: EMV Specifications. http:\/\/www.emvco.com\/specifications.aspx"},{"key":"13_CR3","unstructured":"ISO 7810 Specification. http:\/\/www.iso.org\/iso\/catalogue_detail?csnumber=31432"},{"key":"13_CR4","unstructured":"ISO 14443 Specification. http:\/\/www.iso.org\/iso\/home\/store\/catalogue_ics\/catalogue_detail_ics.htm?csnumber=70170"},{"key":"13_CR5","unstructured":"Android Pay homepage. https:\/\/www.android.com\/intl\/pl_pl\/pay\/"},{"key":"13_CR6","unstructured":"Samsung Pay homepage. http:\/\/www.samsung.com\/us\/samsung-pay\/"},{"key":"13_CR7","unstructured":"http:\/\/www.bankier.pl\/wiadomosc\/Eksperci-Platnosci-HCE-to-rynkowy-przelom-3323308.html"},{"key":"13_CR8","unstructured":"Host Card Emulation. https:\/\/en.wikipedia.org\/wiki\/Host_card_emulation"},{"key":"13_CR9","unstructured":"Near Field Communication. http:\/\/nfc-forum.org\/what-is-nfc\/"},{"key":"13_CR10","unstructured":"EMV Transaction Steps. https:\/\/www.level2kernel.com\/flow-chart.html"},{"issue":"2","key":"13_CR11","first-page":"46","volume":"14","author":"A Sitek","year":"2014","unstructured":"Sitek, A.: One-time code cardholder verification method in electronic funds transfer transactions. Annales UMCS ser. Informatica, AI 14(2), 46\u201359 (2014)","journal-title":"Annales UMCS ser. Informatica, AI"},{"key":"13_CR12","unstructured":"Sitek, A., Kotulski, Z.: Contextual management of off-line authorisation in contact EMV transactions. Telecommun. Rev. Telecommun. News 88(84), 8-9, 953\u2013959 (2015). (in Polish)"},{"key":"13_CR13","unstructured":"Cambridge Dictionary, definition of \u201cReputation\u201d. http:\/\/dictionary.cambridge.org\/dictionary\/english\/reputation"},{"issue":"2","key":"13_CR14","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for on-line service provision. Decis. Support Syst. 43(2), 618\u2013644 (2007)","journal-title":"Decis. Support Syst."},{"key":"13_CR15","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.dss.2014.02.002","volume":"61","author":"S Vavilis","year":"2014","unstructured":"Vavilis, S., Petrovic, M., Zannoe, N.: A reference model for reputation systems. Decis. Support Syst. 61, 147\u2013154 (2014)","journal-title":"Decis. Support Syst."},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A.: Trust and Reputation Systems. Foundations of Security Analysis and Design IV, FOSAD (2007)","DOI":"10.1109\/ARES.2007.71"},{"issue":"4","key":"13_CR17","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/s11235-011-9435-2","volume":"51","author":"T Ciszkowski","year":"2012","unstructured":"Ciszkowski, T., Mazurczyk, W., Kotulski, Z., Ho\u00dffeld, T., Fiedler, M., Collange, D.: Towards quality of experience-based reputation models for future web service provisioning. Telecommun. Syst. 51(4), 283\u2013295 (2012)","journal-title":"Telecommun. Syst."},{"key":"13_CR18","unstructured":"Damiani, E., Capitani, D., di Vimercati, S., Paraboschi, S., Pesenti, M., Samarati, P., Zara, S.: Fuzzy logic techniques for reputation management in anonymous peer-to-peer systems. In: Proceedings of the Third International Conference in Fuzzy Logic and Technology, Zittau, Germany (2003)"},{"key":"13_CR19","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/2835373","volume":"48","author":"E Koutrouli","year":"2015","unstructured":"Koutrouli, E., Tsalgatidou, A.: Reputation systems evolution survey. ACM Comput. Surv. 48, 3 (2015). Article 35","journal-title":"ACM Comput. Surv."},{"key":"13_CR20","unstructured":"Resnick, P., Zeckhauser, R.: Trust among strangers in internet transactions: empirical analysis of ebay\u2019s reputation system. In: The Economics of the Internet and E-Commerce, vol. 11 of Advances in Applied Microeconomics. Elsevier Science (2002)"},{"key":"13_CR21","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1016\/j.jvlc.2014.10.001","volume":"25","author":"G Costagliola","year":"2014","unstructured":"Costagliola, G., Fuccella, V., Pascuccio, F.A.: Towards a trust, reputation and recommendation meta model. J. Vis. Lang. Comput. 25, 850\u2013857 (2014)","journal-title":"J. Vis. Lang. Comput."},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Gupta, M., Judge, P., Ammar, M.: A reputation system for peer-to-peer networks. In: NOSSDAV 2003, 1\u20133 June 2003, USA (2003)","DOI":"10.1145\/776322.776346"},{"key":"13_CR23","unstructured":"Buchegger, S., Le Boudec, J.-Y.: A robust reputation system for P2P and mobile ad-hoc networks. In: Workshop on Economics of Peer-to-Peer Systems (2004)"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Sen, J.: A distributed trust and reputation framework for mobile ad hoc networks. In: Third International Conference (CNSA 2010), Chennai, India, 23\u201325 July 2010 (2010)","DOI":"10.1007\/978-3-642-14478-3_54"},{"key":"13_CR25","volume-title":"On Trust Establishment in Mobile Ad-Hoc Networks","author":"A Srinivasan","year":"2007","unstructured":"Srinivasan, A., Teitelbaum, J., Liang, H.: Reputation and trust-based systems for ad-hoc and sensor networks. In: Boukerche, A. (ed.) On Trust Establishment in Mobile Ad-Hoc Networks. Wiley, New York (2007)"},{"key":"13_CR26","unstructured":"Roman, R., Fernandez-Gago, M.C., Lopez, J.: Trust and reputation systems for wireless sensor networks. In: Security and Privacy in Mobile and Wireless Networking, pp. 105\u2013128 (2009)"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Sabater, J., Sierra, C.: Reputation and social network analysis in multi-agent systems. In: First International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 475\u2013482 (2002)","DOI":"10.1145\/544741.544854"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Pujol, J.M., Sanguesa, R., Delgado, J.: Extracting reputation in multi agent systems by means of social network topology. In: The First International Joint Conference on Autonomous Agents & Multiagent Systems (AAMAS 2002), 15\u201319 July (2002)","DOI":"10.1145\/544741.544853"},{"key":"13_CR29","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","volume":"42","author":"Z Yan","year":"2014","unstructured":"Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for Internet of Things. J. Netw. Comput. Appl. 42, 120\u2013134 (2014)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"13_CR30","doi-asserted-by":"publisher","first-page":"97","DOI":"10.4067\/S0718-18762010000200007","volume":"5","author":"Z Noorian","year":"2010","unstructured":"Noorian, Z., Ulieru, M.: The state of the art in trust and reputation systems: a framework for comparison. J. Theor. Appl. Electron. Commer. Res. 5(2), 97\u2013117 (2010). doi: 10.4067\/S0718-18762010000200007 . Talca ago","journal-title":"J. Theor. Appl. Electron. Commer. Res."},{"key":"13_CR31","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-137-32803-8","volume-title":"Simulation: The Practice of Model Development and Use","author":"S Robinson","year":"2014","unstructured":"Robinson, S.: Simulation: The Practice of Model Development and Use. Palgrave Macmillan, London (2014)"},{"key":"13_CR32","doi-asserted-by":"crossref","DOI":"10.1007\/978-90-481-3570-7","volume-title":"Error Analysis with Application in Engineering","author":"Z Kotulski","year":"2010","unstructured":"Kotulski, Z., Szczepinski, W.: Error Analysis with Application in Engineering. Springer, Dordrecht (2010)"},{"key":"13_CR33","doi-asserted-by":"crossref","unstructured":"Seila, A.F.: Spreadsheet simulation. In: Winter Simulation Conference, California, USA (2006)","DOI":"10.1109\/WSC.2006.323034"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65127-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T22:13:28Z","timestamp":1569968008000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65127-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319651262","9783319651279"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65127-9_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}