{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T11:46:14Z","timestamp":1757591174487,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540883128"},{"type":"electronic","value":"9783540883135"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88313-5_9","type":"book-chapter","created":{"date-parts":[[2008,10,4]],"date-time":"2008-10-04T04:41:44Z","timestamp":1223095304000},"page":"130-145","source":"Crossref","is-referenced-by-count":8,"title":["CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud"],"prefix":"10.1007","author":[{"given":"D.","family":"Nali","sequence":"first","affiliation":[]},{"given":"P. C.","family":"van Oorschot","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Abadi, M., Lomas, T.M.A., Needham, R.: Strengthening Passwords. Technical Report 1997 - 033, Digital Equipment Corporation (1997)"},{"key":"9_CR2","volume-title":"Trusted Computing Platforms \u2013 TCPA Technology in Context","author":"B. Balacheff","year":"2003","unstructured":"Balacheff, B., Chen, L., Pearson, S., Plaquin, D., Proudler, G.: Trusted Computing Platforms \u2013 TCPA Technology in Context. Prentice Hall, Englewood Cliffs (2003)"},{"key":"9_CR3","unstructured":"Chou, N., Ledesma, R., Teraguchi, Y., Boneh, D., Mitchell, J.C.: Client-Side Defense Against Web-Based Identity Theft. In: Network and Distributed System Security Symposium (NDSS 2004). The Internet Society (2004)"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/1073001.1073009","volume-title":"Symposium on Usable Privacy and Security (SOUPS 2005)","author":"R. Dhamija","year":"2005","unstructured":"Dhamija, R., Tygar, J.D.: The Battle Against Phishing: Dynamic Security Skins. In: Symposium on Usable Privacy and Security (SOUPS 2005), pp. 77\u201388. ACM Press, New York (2005)"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/3-540-36563-X_2","volume-title":"Topics in Cryptology - CT-RSA 2003","author":"Y. Dodis","year":"2003","unstructured":"Dodis, Y., Franklin, M., Katz, J., Miyaji, A., Yung, M.: Key-Insulated Public Key Cryptosystems. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol.\u00a02612, pp. 19\u201332. Springer, Heidelberg (2003)"},{"key":"9_CR6","unstructured":"Australian\u00a0Center for Policing\u00a0Research. Standardization of Definitions of Identity Crime Terms - Discussion Paper, Prepared by the Australian Center for Policing Research for the Police Commissioners\u2019 Australian Identity Crime Working Party and the AUSTRAC POI Steering Committee (2005)"},{"key":"9_CR7","unstructured":"NFC Forum (accessed, January 2008), http:\/\/www.nfc-forum.org\/home"},{"key":"9_CR8","volume-title":"IEEE International Conference on Distributed Computing Systems (ICDCS 2006)","author":"M.T. Goodrich","year":"2006","unstructured":"Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G., Uzun, E.: Loud and Clear: Human-Verifiable Authentication Based on Audio. In: IEEE International Conference on Distributed Computing Systems (ICDCS 2006). IEEE, Los Alamitos (2006)"},{"issue":"1","key":"9_CR9","first-page":"1","volume":"2","author":"G.R. Gordon","year":"2005","unstructured":"Gordon, G.R., Willox, N.A.: Identity Fraud: A Critical National and Global Threat. Journal of Economic Crime Management\u00a02(1), 1\u201347 (2005)","journal-title":"Journal of Economic Crime Management"},{"key":"9_CR10","unstructured":"Network\u00a0Working Group. RFC 3538 - Secure Electronic Transaction (SET) Supplement for the v1.0 Internet Open Trading Protocol (IOTP) (2003) (accessed, January 2008), http:\/\/www.faqs.org\/rfcs\/rfc3538.html"},{"key":"9_CR11","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1145\/1060745.1060815","volume-title":"International Conference on World Wide Web (WWW 2005)","author":"J.A. Halderman","year":"2005","unstructured":"Halderman, J.A., Waters, B., Felten, E.W.: A Convenient Method for Securely Managing Passwords. In: International Conference on World Wide Web (WWW 2005), pp. 471\u2013479. ACM Press, New York (2005)"},{"issue":"8","key":"9_CR12","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1145\/358198.358214","volume":"27","author":"J.A. Haskett","year":"1984","unstructured":"Haskett, J.A.: Pass-algorithms: A User Validation Scheme Based on Knowledge of Secret Algorithm. Communications of the ACM\u00a027(8), 777\u2013781 (1984)","journal-title":"Communications of the ACM"},{"key":"9_CR13","unstructured":"Just, M., van Oorschot, P.C.: Addressing the Problem of Undetected Signature Key Compromise. In: Network and Distributed System Security (NDSS 1999). The Internet Society (1999)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Kirda, E., Kruegel, C.: Protecting Users Against Phishing Attacks with AntiPhish. In: Computer Software and Applications Conference 2005, pp. 517\u2013524 (2005)","DOI":"10.1109\/COMPSAC.2005.126"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Koblitz, N., Menezes, A.J.: Another look at provable security II. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol.\u00a04329, pp. 148\u2013175. Springer, Heidelberg (2006)","DOI":"10.1007\/11941378_12"},{"issue":"1","key":"9_CR16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00145-005-0432-z","volume":"20","author":"N. Koblitz","year":"2007","unstructured":"Koblitz, N., Menezes, A.J.: Another look at provable security. Journal of Cryptology\u00a020(1), 3\u201337 (2007)","journal-title":"Journal of Cryptology"},{"issue":"2","key":"9_CR17","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1111\/j.1745-6606.2004.tb00867.x","volume":"38","author":"D. Lacey","year":"2004","unstructured":"Lacey, D., Cuganesan, S.: The Role of Organizations in Identity Theft Response: the Organization-Individual Dynamic. Journal of Consumer Affairs\u00a038(2), 244\u2013261 (2004)","journal-title":"Journal of Consumer Affairs"},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM\u00a024, 770\u2013772 (1981)","journal-title":"Communications of the ACM"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Lomas, T.M.A., Gong, L., Saltzer, J.H., Needham, R.M.: Reducing Risks from Poorly Chosen Keys. ACM SIGOPS Operating Systems Review\u00a023(5) (1989)","DOI":"10.1145\/74851.74853"},{"issue":"4","key":"9_CR20","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/s00446-003-0098-4","volume":"16","author":"P. MacKenzie","year":"2003","unstructured":"MacKenzie, P., Reiter, M.K.: Delegation of cryptographic servers for capture-resilient devices. Distributed Computing\u00a016(4), 307\u2013327 (2003)","journal-title":"Distributed Computing"},{"key":"9_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-540-77366-5_11","volume-title":"Financial Cryptography and Data Security","author":"M. Mannan","year":"2007","unstructured":"Mannan, M., van Oorschot, P.C.: Using a personal device to strengthen password authentication from an untrusted computer. In: Dietrich, S., Dhamija, R. (eds.) FC 2007. LNCS, vol.\u00a04886, pp. 88\u2013103. Springer, Heidelberg (2007)"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: IEEE Symposium on Security and Privacy (May 2005)","DOI":"10.21236\/ADA457868"},{"key":"9_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-540-77366-5_19","volume-title":"Financial Cryptography and Data Security","author":"I. Molloy","year":"2007","unstructured":"Molloy, I., Li, J., Li, N.: Dynamic virtual credit card numbers. In: Dietrich, S., Dhamija, R. (eds.) FC 2007. LNCS, vol.\u00a04886, pp. 208\u2013223. Springer, Heidelberg (2007)"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Nali, D., van Oorschot, P.C.: CROO: A Generic Architecture and Protocol to Detect Identity Fraud (Extended Version). Technical Report, TR-08-17, School of Computer Science, Carleton University, Ottawa, Canada (2008)","DOI":"10.1007\/978-3-540-88313-5_9"},{"key":"9_CR25","unstructured":"Javelin Strategy\u00a0& Research. 2005 Identity Fraud Survey Report (2005), http:\/\/www.javelinstrategy.com\/reports\/2005IdentityFraudSurveyReport.html"},{"key":"9_CR26","unstructured":"Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.C.: Stronger Password Authentication Using Browser Extensions. In: USENIX Security Symposium, pp. 17\u201332 (2005)"},{"key":"9_CR27","first-page":"236","volume-title":"ACM Conference on Computer and Communications Security (CCS 2004)","author":"V. Roth","year":"2004","unstructured":"Roth, V., Richter, K., Freidinger, R.: A PIN-Entry Method Resilient Against Shoulder Surfing. In: ACM Conference on Computer and Communications Security (CCS 2004), pp. 236\u2013245. ACM Press, New York (2004)"},{"key":"9_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-46088-8_18","volume-title":"Financial Cryptography 2001","author":"A.D. Rubin","year":"2002","unstructured":"Rubin, A.D., Wright, R.N.: Off-line generation of limited-use credit card numbers. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol.\u00a02339, pp. 196\u2013209. Springer, Heidelberg (2002)"},{"key":"9_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-46088-8_20","volume-title":"Financial Cryptography","author":"A. Shamir","year":"2002","unstructured":"Shamir, A.: Secureclick: A web payment system with disposable credit card numbers. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol.\u00a02339, pp. 232\u2013242. Springer, Heidelberg (2002)"},{"key":"9_CR30","first-page":"221","volume-title":"ACM Symposium on Applied Computing 2002 (SAC 2002)","author":"A. Singh","year":"2003","unstructured":"Singh, A., dos Santos, A.L.M.: Grammar based off line generation of disposable credit card numbers. In: ACM Symposium on Applied Computing 2002 (SAC 2002), pp. 221\u2013228. ACM Press, New York (2003)"},{"key":"9_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/11507840_3","volume-title":"Financial Cryptography and Data Security","author":"P.C. Oorschot van","year":"2005","unstructured":"van Oorschot, P.C., Stubblebine, S.: Countering Identity Theft through Digital Uniqueness, Location Cross-Checking, and Funneling. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol.\u00a03570, pp. 31\u201343. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Computer Security - ESORICS 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88313-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T10:54:33Z","timestamp":1738407273000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88313-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540883128","9783540883135"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88313-5_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}