{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:01:32Z","timestamp":1743055292403,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811359064"},{"type":"electronic","value":"9789811359071"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5907-1_48","type":"book-chapter","created":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T07:01:52Z","timestamp":1549522912000},"page":"459-472","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards a Two Factor Authentication Method Using Zero-Knowledge Protocol in Online Banking Services"],"prefix":"10.1007","author":[{"given":"Manish","family":"Singh","sequence":"first","affiliation":[]},{"given":"Yichen","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,8]]},"reference":[{"key":"48_CR1","unstructured":"Sottek, T.C., Kopfstein, J.: Everything you need to know about PRISM. \n                    https:\/\/www.theverge.com\/2013\/7\/17\/4517480\/nsa-spying-prism-surveillance-cheat-sheet\n                    \n                  . Accessed 17 July 2013"},{"key":"48_CR2","unstructured":"Tamimi, A.A., Al-Allaf, O.N.A., Alia, M.A.: Cryptography based authentication methods. In: Proceedings of the World Congress on Engineering and Computer Science, pp. 199\u2013204 (2014)"},{"key":"48_CR3","unstructured":"Shah, N.: Google official blog. \n                    https:\/\/googleblog.blogspot.co.nz\/2011\/02\/advanced-sign-in-security-for-your.html\n                    \n                  . Accessed 7 Dec 2011"},{"key":"48_CR4","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"A Fiat","year":"1988","unstructured":"Fiat, A., Shamir, A., Feige, U.: Zero-knowledge proofs of identity. J. Cryptol. 1, 77\u201394 (1988)","journal-title":"J. Cryptol."},{"key":"48_CR5","unstructured":"Christie, S.: FRIDAY AFTERNOON FRAUD How hackers can pose as your email contacts to take your cash\u2026 and the banks will NOT refund you. The Sun. \n                    https:\/\/www.thesun.co.uk\/living\/2699976\/how-criminals-can-hack-into-emails-and-trick-you-into-transferring-cash-and-banks-have-no-way-to-stop-it\/\n                    \n                  . Accessed 25 Jan 2017"},{"key":"48_CR6","unstructured":"Touryalai, H.: World\u2019s 100 Biggest Banks: China\u2019s ICBC #1, No U.S. Banks in Top 5. \n                    https:\/\/www.forbes.com\/sites\/halahtouryalai\/2014\/02\/12\/worlds-100-biggest-banks-chinas-icbc-1-no-u-s-banks-in-top-5\/#1c75f0ce22ab\n                    \n                  . Accessed 12 Feb 2014"},{"key":"48_CR7","unstructured":"Chase (2017). \n                    https:\/\/www.chase.com\/online\/digital\/online-banking.html"},{"key":"48_CR8","unstructured":"Tierney, S.: Wire Transfers: What Banks Charge. \n                    https:\/\/www.nerdwallet.com\/blog\/banking\/wire-transfers-what-banks-charge\/\n                    \n                  . Accessed 8 Sept 2017"},{"key":"48_CR9","unstructured":"real banks: Banks around the World (2017). \n                    https:\/\/www.relbanks.com\/oceania\/new-zealand\/anz-new-zealand"},{"key":"48_CR10","unstructured":"ANZ: OnlineCode (2017). \n                    https:\/\/www.anz.co.nz\/banking-with-anz\/banking-safely\/online-code\/"},{"key":"48_CR11","unstructured":"Relbanks: Banks around the world (2017). \n                    https:\/\/www.relbanks.com\/oceania\/new-zealand\/bank-of-new-zealand"},{"key":"48_CR12","unstructured":"BNZ: Help & Support (2017). \n                    https:\/\/www.bnz.co.nz\/support\/banking\/privacy-and-security\/netguard"},{"key":"48_CR13","unstructured":"Westpac: Westpac Online Guardian (2017). \n                    https:\/\/www.westpac.co.nz\/branch-mobile-online\/safety-and-security-online\/westpac-online-guardian\/"},{"key":"48_CR14","unstructured":"KIWIBANK (2017). \n                    https:\/\/www.kiwibank.co.nz\/about-us\/security\/how-we-protect-you\/KeepSafe\/"},{"key":"48_CR15","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S Micali","year":"1989","unstructured":"Micali, S., Rackof, C., Goldwasser, S.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18, 186\u2013208 (1989)","journal-title":"SIAM J. Comput."},{"key":"48_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/3-540-44647-8_24","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001","author":"O Goldreich","year":"2001","unstructured":"Goldreich, O., Lindell, Y.: Session-key generation using human passwords only. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 408\u2013432. Springer, Heidelberg (2001). \n                    https:\/\/doi.org\/10.1007\/3-540-44647-8_24"},{"key":"48_CR17","unstructured":"Nyguyen, Q., Rudoy, M., Srinivasan, A.: Two factor zero knowledge proof authentication system. (n.d.) (2014)"},{"key":"48_CR18","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-642-35461-8_7","volume-title":"Advances in Intelligent Systems and Computing","author":"Nivedita Datta","year":"2013","unstructured":"Datta, N.: Zero knowledge password authentication protocol. In: Patnaik, S., Tripathy, P., Naik, S. (eds.) New Paradigms in Internet Computing. Advances in Intelligent Systems and Computing, vol. 203, pp. 71\u201379. Springer, Heidelberg (2013). \n                    https:\/\/doi.org\/10.1007\/978-3-642-35461-8_7"},{"key":"48_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-47721-7_14","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 86","author":"D Chaum","year":"1987","unstructured":"Chaum, D., Evertse, J.-H., van de Graaf, J., Peralta, R.: Demonstrating possession of a discrete logarithm without revealing it. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 200\u2013212. Springer, Heidelberg (1987). \n                    https:\/\/doi.org\/10.1007\/3-540-47721-7_14"}],"container-title":["Communications in Computer and Information Science","Parallel and Distributed Computing, Applications and Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5907-1_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:42:18Z","timestamp":1558395738000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5907-1_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811359064","9789811359071"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5907-1_48","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"8 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PDCAT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Parallel and Distributed Computing: Applications and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pdcat2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.pdcat2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}