{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:41:14Z","timestamp":1725550874830},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642122132"},{"type":"electronic","value":"9783642122149"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12214-9_101","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T19:11:44Z","timestamp":1270062704000},"page":"565-567","source":"Crossref","is-referenced-by-count":2,"title":["Security Solutions to the Phishing: Transactions Based on Security Questions and Image"],"prefix":"10.1007","author":[{"given":"Aruna Kumari","family":"Devarakonda","sequence":"first","affiliation":[]},{"given":"Prasamsa","family":"Tummala","sequence":"additional","affiliation":[]},{"given":"Indra Praveen","family":"Sandrala","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"101_CR1","unstructured":"Microsoft. Anti-Phishing Technologies (2005), \n                  \n                    http:\/\/www.microsoft.com"},{"key":"101_CR2","unstructured":"Microsoft. Browser Helper Objects: The Browser the Way You Want It (2005), \n                  \n                    http:\/\/msdn.microsoft.com"},{"key":"101_CR3","unstructured":"Microsoft. Sender ID Framework Overview (2005), \n                  \n                    http:\/\/www.microsoft.com"},{"key":"101_CR4","unstructured":"Anti-Phishing Working Group"},{"key":"101_CR5","unstructured":"CRM Today. Financial Insights Evaluates Impact of Phishing on Retail Financial Institutions Worldwide, CRM Today, July 15 (2004)"},{"key":"101_CR6","unstructured":"Cranor, L., Egelman, S., Hong, J., Zhang, Y.: Phinding phish: An evaluation of anti-phishing toolbars. Technical report, Carnegie Mellon University (November 2006)"}],"container-title":["Communications in Computer and Information Science","Information Processing and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12214-9_101.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:05:47Z","timestamp":1619784347000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12214-9_101"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642122132","9783642122149"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12214-9_101","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}