{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T05:20:06Z","timestamp":1740028806885,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642122132"},{"type":"electronic","value":"9783642122149"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12214-9_38","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T19:11:44Z","timestamp":1270062704000},"page":"233-237","source":"Crossref","is-referenced-by-count":0,"title":["A Secure e-Shopping Using Voice Ordering"],"prefix":"10.1007","author":[{"given":"Saroj Kumar","family":"Panigrahy","sequence":"first","affiliation":[]},{"given":"Debasish","family":"Jena","sequence":"additional","affiliation":[]},{"given":"Sanjay Kumar","family":"Jena","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","volume-title":"A Concrete Introduction to Higher Algebra","author":"L.N. Childs","year":"2008","unstructured":"Childs, L.N.: A Concrete Introduction to Higher Algebra. Springer, Heidelberg (2008)"},{"key":"38_CR2","volume-title":"Cryptography and Network Security: Principles and Practices","author":"W. Stallings","year":"2003","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practices, 3rd edn. Pearson Education, London (2003)","edition":"3"},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"Burstein, A., Stolzle, A., Brodersen, R.: Using speech recognition in a personal communications system. In: IEEE International Conference on Communications, ICC 1992, Conference record, SUPERCOMM\/ICC 1992, Discovering a New World of Communications, June 1992, vol.\u00a03, pp. 1717\u20131721 (1992)","DOI":"10.1109\/ICC.1992.268002"},{"key":"38_CR4","volume-title":"Visual Basic. Net Programming Bible","author":"B. Evjen","year":"2002","unstructured":"Evjen, B., Beres, J., et al.: Visual Basic. Net Programming Bible. Wiley, Chichester (2002)"},{"key":"38_CR5","volume-title":"Visual Basic .net Programming Little Black Book","author":"S. Holzner","year":"2005","unstructured":"Holzner, S.: Visual Basic.net Programming Little Black Book. Wiley Dreamtech, Chichester (2005)"}],"container-title":["Communications in Computer and Information Science","Information Processing and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12214-9_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T20:11:29Z","timestamp":1739995889000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12214-9_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642122132","9783642122149"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12214-9_38","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}