{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:22:19Z","timestamp":1725517339886},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540857167"},{"type":"electronic","value":"9783540857174"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85717-4_2","type":"book-chapter","created":{"date-parts":[[2008,8,22]],"date-time":"2008-08-22T14:19:42Z","timestamp":1219414782000},"page":"11-20","source":"Crossref","is-referenced-by-count":0,"title":["A Light Number-Generation Scheme for Feasible and Secure Credit-Card-Payment Solutions"],"prefix":"10.1007","author":[{"given":"Francesco","family":"Buccafurri","sequence":"first","affiliation":[]},{"given":"Gianluca","family":"Lax","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1145\/381677.381695","volume-title":"MobiCom 2001: Proceedings of the 7th annual international conference on Mobile computing and networking","author":"N. Borisov","year":"2001","unstructured":"Borisov, N., Goldberg, I., Wagner, D.: Intercepting mobile communications: the insecurity of 802.11. In: MobiCom 2001: Proceedings of the 7th annual international conference on Mobile computing and networking, pp. 180\u2013189. ACM Press, New York (2001)"},{"key":"2_CR2","unstructured":"ECMA. ECMA-182: Data Interchange on 12,7 mm 48-Track Magnetic Tape Cartridges \u2014 DLT1 Format (December 1992)"},{"issue":"2","key":"2_CR3","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/1015860.1015862","volume":"9","author":"J.R. Hill","year":"1979","unstructured":"Hill, J.R.: A table driven approach to cyclic redundancy check calculations. SIGCOMM Comput. Commun. Rev.\u00a09(2), 40\u201360 (1979)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"2_CR4","unstructured":"Li, Y., Zhang, X.: A security-enhanced one-time payment scheme for credit card. In: Proceedings of the 14th International Workshop on Research Issues on Data Engineering: Web Services for E-Commerce and E-Government Applications (RIDE 2004), pp. 40\u201347 (2004)"},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1016\/j.elerap.2005.06.002","volume":"4","author":"Y. Li","year":"2005","unstructured":"Li, Y., Zhang, X.: Securing credit card transactions with one-time payment scheme. Electronic Commerce Research and Applications\u00a04, 413\u2013426 (2005)","journal-title":"Electronic Commerce Research and Applications"},{"issue":"950","key":"2_CR6","first-page":"48","volume":"2","author":"H.P. Luhn","year":"1960","unstructured":"Luhn, H.P.: Computer for verifying numbers. U.S. Patent\u00a02, 950, 048 (1960)","journal-title":"U.S. Patent"},{"key":"2_CR7","unstructured":"NIST\/NSA. Fips 180-2 secure hash standard (SHS). NIST\/NSA (August 2002)"},{"key":"2_CR8","unstructured":"Dynamic passcode authentication, http:\/\/www.visaeurope.com"},{"key":"2_CR9","unstructured":"Private Payments, http:\/\/www10.americanexpress.com"},{"key":"2_CR10","unstructured":"Paypal, http:\/\/www.paypal.com"},{"key":"2_CR11","unstructured":"Peterson, W.W.: Error-correcting codes. MIT Press and J. Wiley & Sons (1961)"},{"issue":"4","key":"2_CR12","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/40.7773","volume":"8","author":"T.V. Ramabadran","year":"1988","unstructured":"Ramabadran, T.V., Gaitonde, S.S.: A tutorial on crc computations. IEEE Micro.\u00a08(4), 62\u201375 (1988)","journal-title":"IEEE Micro."},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Rubin, A., Wright, N.: Off-line generation of limited-use credit card numbers. In: Proceedings of the Fifth International Conference on Financial Cryptography, pp. 165\u2013175 (2001)","DOI":"10.1007\/3-540-46088-8_18"},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1145\/63030.63037","volume":"31","author":"D.V. Sarwate","year":"1988","unstructured":"Sarwate, D.V.: Computation of cyclic redundancy checks via table look-up. Commun. ACM\u00a031, 1008\u20131013 (1988)","journal-title":"Commun. ACM"},{"key":"2_CR15","unstructured":"SET Secure Electronic Transaction LLC. SET Secure Electronic Transaction Specification, http:\/\/www.setco.org"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/3-540-46088-8_20","volume-title":"FC 2001: Proceedings of the 5th International Conference on Financial Cryptography","author":"A. Shamir","year":"2002","unstructured":"Shamir, A.: Secureclick: A web payment system with disposable credit card numbers. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol.\u00a02339, pp. 232\u2013242. Springer, Heidelberg (2002)"},{"key":"2_CR17","first-page":"221","volume-title":"SAC 2002: Proceedings of the 2002 ACM symposium on Applied computing","author":"A. Singh","year":"2003","unstructured":"Singh, A., dos Santos, A.L.M.: Grammar based off line generation of disposable credit card numbers. In: SAC 2002: Proceedings of the 2002 ACM symposium on Applied computing, pp. 221\u2013228. ACM Press, New York (2003)"},{"key":"2_CR18","unstructured":"Singh, A., dos Santos, A.L.M.: Context free grammar for the generation of one time authentication identity. In: FLAIRS Conference (2004)"},{"issue":"2","key":"2_CR19","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1145\/996943.996948","volume":"7","author":"A. Stubblefield","year":"2004","unstructured":"Stubblefield, A., Ioannidis, J., Rubin, A.D.: A key recovery attack on the 802.11b wired equivalent privacy protocol (wep). ACM Trans. Inf. Syst. Secur.\u00a07(2), 319\u2013332 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur."}],"container-title":["Lecture Notes in Computer Science","E-Commerce and Web Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85717-4_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,19]],"date-time":"2023-05-19T18:11:47Z","timestamp":1684519907000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85717-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540857167","9783540857174"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85717-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}