{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:06:03Z","timestamp":1725516363517},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540698401"},{"type":"electronic","value":"9783540698487"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69848-7_42","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T12:07:43Z","timestamp":1218542863000},"page":"514-525","source":"Crossref","is-referenced-by-count":3,"title":["New E-Payment Scenarios in an Extended Version of the Traditional Model"],"prefix":"10.1007","author":[{"given":"Mildrey","family":"Carbonell","sequence":"first","affiliation":[]},{"given":"Joaquin","family":"Torres","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Izquierdo","sequence":"additional","affiliation":[]},{"given":"Diego","family":"Suarez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Kungpisdan, S.: Modelling, design, and analysis of Secure Mobile Payment Systems., Thesis for Doctor of Philosophy, Faculty of Information Technology, Monash University (2005), http:\/\/beast.csse.monash.edu.au\/~srini\/theses\/keng.pdf","key":"42_CR1"},{"unstructured":"3-D Secure. System Overview. 70015-01 External Version Copyright \u00a9 2002-2003. Visa International Version 1.0.2 (May 01, 2003), http:\/\/partnernetwork.visa.com\/pf\/3dsec\/download\/trk_3dsec_system_overview_v102.pdf","key":"42_CR2"},{"key":"42_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-05322-5","volume-title":"Payment technologies for e-commerce","author":"W. Kou","year":"2003","unstructured":"Kou, W.: Payment technologies for e-commerce. Springer, Heidelberg (2003)"},{"unstructured":"O\u2019Mahony, D.: Electronic payment systems for e-commerce. Artech House (2001)","key":"42_CR4"},{"unstructured":"Secure system to pay with mobile phone charging the amount directly to a payment card, http:\/\/www.mobipay.com","key":"42_CR5"},{"unstructured":"Secure online payment gateway: PayPal, www.paypal.com","key":"42_CR6"},{"unstructured":"Payment gateway: Authorize.Net, http:\/\/www.authorizenet.com\/","key":"42_CR7"},{"doi-asserted-by":"crossref","unstructured":"Rees, J., Honeyman, P.: Webcard: a Java Card web server. In: Proc. of 4th IFIP Smart Card Research and Advanced Application Conference, CARDIS 2000, Bristol, U.K (2000)","key":"42_CR8","DOI":"10.1007\/978-0-387-35528-3_11"},{"issue":"17","key":"42_CR9","doi-asserted-by":"publisher","first-page":"1655","DOI":"10.1016\/S0140-3664(00)00252-8","volume":"23","author":"P. Urien","year":"2000","unstructured":"Urien, P.: Internet card, a smart card as a true Internet node. Computer Communications\u00a023(17), 1655\u20131666 (2000)","journal-title":"Computer Communications"},{"doi-asserted-by":"crossref","unstructured":"Postel, J.: Transmission Control Protocol. IETF RFC 079 (September 1981)","key":"42_CR10","DOI":"10.17487\/rfc0793"},{"unstructured":"IST Project RESET, Roadmap for European Research on Smartcard related Technologies, IST-2001-39046: Final Roadmap, v.5 (May 2003)","key":"42_CR11"},{"key":"42_CR12","volume-title":"Proc. of 4th IFIP Smart Card Research and Advanced Application Conference, CARDIS 2004","author":"M. Montgomery","year":"2004","unstructured":"Montgomery, M., Ali, A., Lu, H.K.: Secure Network Card. Implementation of a Standard Network Stack in a Smart Card. In: Proc. of 4th IFIP Smart Card Research and Advanced Application Conference, CARDIS 2004, Toulouse, France, August 23-26, 2004. Kluwer Academic Publishers, Dordrecht (2004)"},{"unstructured":"Lu, H.K.: New Advances in Smart Card Communications, International Conference on Computing. In: Communications and Control technologies (CCCT), Austin, TX, USA, August 14-17 (2004)","key":"42_CR13"},{"key":"42_CR14","series-title":"Lecture Notes in Computer Science","volume-title":"Information Security","author":"H.K. Lu","year":"2004","unstructured":"Lu, H.K., Ali, A.: Prevent On-line Identity Theft - Using Network Smart Cards for Secure On-line Transactions. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol.\u00a03225. Springer, Heidelberg (2004)"},{"unstructured":"Ali, A., Lu, K., Montgomery, M.: Network Smart Card: A New Paradigm of Secure On-line Transactions. In: Proc. of Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), Chiba, Japan, May 30 - June 1 (2005)","key":"42_CR15"},{"issue":"9","key":"42_CR16","doi-asserted-by":"publisher","first-page":"2249","DOI":"10.1016\/j.comnet.2007.01.010","volume":"51","author":"J. Torres","year":"2007","unstructured":"Torres, J., Izquierdo, A., Sierra, J.M.: Advances in network smart cards authentication. Computer Networks\u00a051(9), 2249\u20132261 (2007)","journal-title":"Computer Networks"},{"issue":"15","key":"42_CR17","doi-asserted-by":"publisher","first-page":"2781","DOI":"10.1016\/j.comcom.2005.10.029","volume":"29","author":"J. Torres","year":"2006","unstructured":"Torres, J., Izquierdo, A., Sierra, J.M., Ribagorda, A.: Towards selfauthenticable smart cards. Computer Communications\u00a029(15), 2781\u20132787 (2006)","journal-title":"Computer Communications"},{"unstructured":"Porter, M.: Strategy and the Internet. Harvard Business Review, 63\u201378 (March 2001)","key":"42_CR18"},{"issue":"3","key":"42_CR19","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1046\/j.1365-2575.2002.00123.x","volume":"12","author":"G. Giaglis","year":"2002","unstructured":"Giaglis, G., Klein, S., O\u2019Keefe, R.: The role of intermediaries in electronic marketplaces: developing a contingency model. Information Systems Journal\u00a012(3), 231 (2002)","journal-title":"Information Systems Journal"},{"issue":"4","key":"42_CR20","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1016\/j.comnet.2004.02.008","volume":"45","author":"M. Dikaiakos","year":"2004","unstructured":"Dikaiakos, M.: Intermediary infrastructures for the World Wide Web. Computer Networks\u00a045(4), 421\u2013447 (2004)","journal-title":"Computer Networks"},{"issue":"12","key":"42_CR21","doi-asserted-by":"publisher","first-page":"2308","DOI":"10.1016\/j.comcom.2006.03.005","volume":"29","author":"O. Esparza","year":"2006","unstructured":"Esparza, O., Mu\u00f1oz, J., Soriano, M., Forn\u00e9, J.: Secure brokerage mechanisms for mobile electronic commerce. Computer Communications\u00a029(12), 2308\u20132321 (2006)","journal-title":"Computer Communications"},{"issue":"1","key":"42_CR22","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1287\/isre.1040.0014","volume":"15","author":"H. Bhargava","year":"2004","unstructured":"Bhargava, H., Choudhary, V.: Economics of an Information Intermediary with Aggregation Benefits. Information Systems Research\u00a015(1), 22\u201336 (2004)","journal-title":"Information Systems Research"},{"issue":"1","key":"42_CR23","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1287\/isre.1040.0014","volume":"15","author":"H. Bhargava","year":"2004","unstructured":"Bhargava, H., Choudhary, V.: Economics of an Information Intermediary with Aggregation Benefits. Information Systems Research\u00a015(1), 22\u201336 (2004)","journal-title":"Information Systems Research"},{"doi-asserted-by":"crossref","unstructured":"Wang, Y., Varadharajan, V.: A mobile autonomous agent-based secure payment protocol supporting multiple payments. In: IAT 2005, pp. 88\u201394 (2005)","key":"42_CR24","DOI":"10.1109\/IAT.2005.13"},{"doi-asserted-by":"crossref","unstructured":"Carbonell, M., Sierra, J., Torres, J., Izquierdo, A.: Security analysis of a new multi-party payment protocol with intermediary service. In: DEXA Workshops 2007, pp. 698\u2013702 (2007)","key":"42_CR25","DOI":"10.1109\/DEXA.2007.130"},{"doi-asserted-by":"crossref","unstructured":"Chari, S., Kermani, P., Smith, S., Tassiulas, L.: Security Issues in MCommerce: An Usage-Based Taxonomy. In: Proceedings of E-Commerce Agents, pp. 264\u2013282 (2001)","key":"42_CR26","DOI":"10.1007\/3-540-45370-9_16"},{"doi-asserted-by":"crossref","unstructured":"Tellez Isaac, J., Sierra C\u00e1mara, J.M.: Anonymous Payment in a Client Centric Model for Digital Ecosystems. In: Proceedings of IEEE International Digital Ecosystems and Technologies (DEST), Australia (2007)","key":"42_CR27","DOI":"10.1109\/DEST.2007.372011"},{"issue":"2","key":"42_CR28","first-page":"1","volume":"1","author":"J. Tellez","year":"2006","unstructured":"Tellez, J., Sierra, J.M., Izquierdo, A., Torres, J.: Anonymous Payment in a Kiosk Centric Model using Digital signature scheme with message recovery and Low Computional Power Devices. Journal of Theorical and Applied Electronic Commerce Research\u00a01(2), 1\u201311 (2006)","journal-title":"Journal of Theorical and Applied Electronic Commerce Research"},{"key":"42_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/3-540-45598-1_18","volume-title":"Electronic Commerce","author":"A. Bartelt","year":"2001","unstructured":"Bartelt, A., Lamersdorf, W.: A multi-criteria taxonomy of business models in electronic commerce. In: Fiege, L., M\u00fchl, G., Wilhelm, U.G. (eds.) WELCOM 2001. LNCS, vol.\u00a02232, pp. 193\u2013205. Springer, Heidelberg (2001)"},{"unstructured":"Rappa, M.: Business models on the web. Managing the digital enterprise(October 2006), http:\/\/digitalenterprise.org\/models\/models.html","key":"42_CR30"},{"key":"42_CR31","volume-title":"Cryptography and network security: principles and practices, ch. 16-20","author":"W. Stallings","year":"2006","unstructured":"Stallings, W.: Cryptography and network security: principles and practices, ch. 16-20. Prentice Hall, Englewood Cliffs (2006)"},{"issue":"1","key":"42_CR32","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.cose.2004.11.001","volume":"24","author":"T. Tsiakis","year":"2005","unstructured":"Tsiakis, T., Stheohanidews, G.: The concept f security and trust in electronic payments. Computer & Security\u00a024(1), 10\u201315 (2005)","journal-title":"Computer & Security"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69848-7_42.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T00:03:41Z","timestamp":1605744221000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69848-7_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540698401","9783540698487"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69848-7_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}