{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:02:39Z","timestamp":1774551759802,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642545245","type":"print"},{"value":"9783642545252","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_41","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"461-472","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing E-Payment Security through Biometric Based Personal Authentication Using Steganography Scheme \u2013 B-PASS"],"prefix":"10.1007","author":[{"given":"Balasubramanian","family":"Chelliah","sequence":"first","affiliation":[]},{"given":"S.","family":"Geetha","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"41_CR1","doi-asserted-by":"crossref","unstructured":"Gartner, Inc.: The Evolution of e-Business Security Requirements. VeriSign. Inc White Paper, 1\u201352 (2001)","DOI":"10.1016\/S1353-4858(01)00401-9"},{"issue":"7","key":"41_CR2","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1108\/09590550610673617","volume":"34","author":"G. Winch","year":"2006","unstructured":"Winch, G., Joyce, P.: Exploring the dynamics of building, and losing, consumer trust in B2C e-Business. International Journal of Retail and Distribution Management\u00a034(7), 541\u2013555 (2006)","journal-title":"International Journal of Retail and Distribution Management"},{"issue":"2","key":"41_CR3","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/TIFS.2006.873653","volume":"1","author":"A.K. Jain","year":"2006","unstructured":"Jain, A.K., Ross, A., Pankanti, S.: Biometrics: A Tool for Information Security. IEEE Transactions on Information Forensics and Security\u00a01(2), 125\u2013144 (2006)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"41_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/3-540-44463-7_3","volume-title":"Electronic Commerce and Web Technologies","author":"K. Knorr","year":"2000","unstructured":"Knorr, K., R\u00f6hrig, S.: Security of Electronic Business Applications: Structure and Quantification. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2000. LNCS, vol.\u00a01875, pp. 25\u201337. Springer, Heidelberg (2000)"},{"key":"41_CR5","unstructured":"Jewson, R.: E-payments: Credit Cards on the Internet. Aconite White paper, 1\u201333 (2001)"},{"key":"41_CR6","unstructured":"Anderson, R.: Security Engineering - A Guide to Building Dependable Distributed Systems. WILEY Computer Publishing (2001)"},{"key":"41_CR7","unstructured":"Wolrath, C.: Secure Electronic Transaction: a market survey and a test implementation of SET technology. Master Thesis, UPPSALA University (1998)"},{"issue":"1","key":"41_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TPAMI.2006.20","volume":"28","author":"R. Cappelli","year":"2006","unstructured":"Cappelli, R., Maio, D., Maltoni, D., Wayman, J.L., Jain, A.K.: Performance evaluation of fingerprint verification systems. IEEE Trans. Pattern Anal. Mach. Intell.\u00a028(1), 3\u201318 (2006)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"41_CR9","unstructured":"Ross, A.: Information Fusion in fingerprint Authentication. PhD Thesis, Michigan State University (2003)"},{"issue":"4","key":"41_CR10","doi-asserted-by":"crossref","first-page":"396","DOI":"10.7763\/IJIMT.2012.V3.262","volume":"3","author":"B. Maniam","year":"2012","unstructured":"Maniam, B., Naranjo, L., Subramaniam, G.: E-Commerce Best Practices: How to Achieve an Environment of Trust and Security. International Journal of Innovation, Management and Technology\u00a03(4), 396\u2013401 (2012)","journal-title":"International Journal of Innovation, Management and Technology"},{"key":"41_CR11","first-page":"36","volume":"12","author":"H. Houmani","year":"2012","unstructured":"Houmani, H., Mejri, M.: Formal analysis of SET and NSL protocols using the interpretation functions-based method. Journal of Computer Networks and Communications\u00a012, 36\u201348 (2012)","journal-title":"Journal of Computer Networks and Communications"},{"key":"41_CR12","unstructured":"Visa International, 3-D Secure Introduction, Visa International Service Association (2002)"},{"key":"41_CR13","unstructured":"GPayments, VISA 3-D Secure vs. MasterCard SPA, http:\/\/www.gpayments.com"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T00:43:01Z","timestamp":1648255381000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_41","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}