{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T23:44:59Z","timestamp":1769384699529,"version":"3.49.0"},"reference-count":21,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2003,5,1]],"date-time":"2003-05-01T00:00:00Z","timestamp":1051747200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Standards &amp; Interfaces"],"published-print":{"date-parts":[[2003,5]]},"DOI":"10.1016\/s0920-5489(02)00102-2","type":"journal-article","created":{"date-parts":[[2003,4,7]],"date-time":"2003-04-07T17:19:33Z","timestamp":1049735973000},"page":"119-129","source":"Crossref","is-referenced-by-count":22,"title":["Securing on-line credit card payments without disclosing privacy information"],"prefix":"10.1016","volume":"25","author":[{"given":"Jing-Jang","family":"Hwang","sequence":"first","affiliation":[]},{"given":"Tzu-Chang","family":"Yeh","sequence":"additional","affiliation":[]},{"given":"Jung-Bin","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0920-5489(02)00102-2_BIB1","unstructured":"IITF principles, supra note 19, at 5."},{"key":"10.1016\/S0920-5489(02)00102-2_BIB2","unstructured":"L., Behrens, Privacy and security: The hidden growth strategy, May 31, 2001, http:\/\/www.gartnerg2.com\/site\/searchresults.asp."},{"issue":"5","key":"10.1016\/S0920-5489(02)00102-2_BIB3","article-title":"The public policy report","volume":"3","author":"Caldwell","year":"2001","journal-title":"CommerceNet Newsletter"},{"key":"10.1016\/S0920-5489(02)00102-2_BIB4","unstructured":"ITAA, ITAA poll finds almost three of four Americans concerned about cyber security, Dec. 11, 2001, http:\/\/www.itaa.org\/isec\/pubs\/e200112-05.pdf."},{"key":"10.1016\/S0920-5489(02)00102-2_BIB5","unstructured":"MasterCard and VISA, Secure Electronic Transaction (SET) Specification, Book 1: Business Description, version 1.0 (1997)."},{"key":"10.1016\/S0920-5489(02)00102-2_BIB6","unstructured":"MasterCard and VISA, Secure Electronic Transaction (SET) Specification, Book 2: Programmer's guide, version 1.0 (1997)."},{"key":"10.1016\/S0920-5489(02)00102-2_BIB7","unstructured":"MasterCard and VISA, Secure Electronic Transaction (SET) Specification, Book 3: Formal Protocol Definition, version 1.0 (1997)."},{"key":"10.1016\/S0920-5489(02)00102-2_BIB8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0920-5489(97)00003-2","article-title":"Greater protection for credit card holders: a revised SET protocol","volume":"19","author":"Hwang","year":"1998","journal-title":"Computer Standards and Interfaces"},{"key":"10.1016\/S0920-5489(02)00102-2_BIB9","unstructured":"VISA EU, 3D SET, http:\/\/www.visaeu.com\/virtual_visa\/merchants\/3dset.html."},{"key":"10.1016\/S0920-5489(02)00102-2_BIB10","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/S1361-3723(01)00615-7","article-title":"Cybercrimes of the 21st century: crimes against the individual\u2014part 1","volume":"6","author":"Riem","year":"2001","journal-title":"Computer Fraud and Security"},{"key":"10.1016\/S0920-5489(02)00102-2_BIB11","series-title":"A New Scheme of Credit Based Payment for Electronic Commerce","first-page":"278","author":"Mu","year":"1998"},{"key":"10.1016\/S0920-5489(02)00102-2_BIB12","series-title":"Efficient Commerce Protocols Based on One-Time Pads","first-page":"317","author":"Schneider","year":"2000"},{"issue":"4","key":"10.1016\/S0920-5489(02)00102-2_BIB13","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1109\/49.839936","article-title":"Design, implementation, and deployment of the iKP secure electronic payment system","volume":"18","author":"Bellare","year":"2000","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/S0920-5489(02)00102-2_BIB14","unstructured":"Australian Transaction Report and Analysis Centre, RGEC report\u2014research and technical advice volume 3, Dec. (1999), http:\/\/www.austrac.gov.au\/text\/publications\/rgec\/3\/pdf\/ch1.pdf.."},{"key":"10.1016\/S0920-5489(02)00102-2_BIB15","unstructured":"Network Working Group, AAA Authorization Application Examples, RFC 2905, http:\/\/www.faqs.org\/rfcs\/rfc2905.html."},{"issue":"11","key":"10.1016\/S0920-5489(02)00102-2_BIB16","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","article-title":"Password authentication with insecure communication","volume":"24","author":"Lamport","year":"1981","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0920-5489(02)00102-2_BIB17","article-title":"The S\/KEY one-time password system","volume":"1760","author":"Haller","year":"1995","journal-title":"RFC"},{"key":"10.1016\/S0920-5489(02)00102-2_BIB18","unstructured":"R. Rivest, A. Shamir, PayWord and MicroMint: Two simple micropayment schemes, MIT Laboratory for Computer Science, May (1997)."},{"key":"10.1016\/S0920-5489(02)00102-2_BIB19","unstructured":"Hallam-Baker, M. Phillip, Micro Payment Transfer Protocol (MPTP) version 0.1, W3C Working Draft, 22, Nov. (1995), http:\/\/www.w3.org\/pub\/WWW\/TR\/WD-mptp951122."},{"key":"10.1016\/S0920-5489(02)00102-2_BIB20","unstructured":"R. Hauser, M. Steiner, M. Waidner, Micro-payments based on iKP, IBM Research, 12 February 1996, Research Report 2791."},{"key":"10.1016\/S0920-5489(02)00102-2_BIB21","unstructured":"R. Hauser, G. Tsudik, On shopping incognito, Proc. 2nd USENIX Workshop on Electronic Commerce, Nov. 1996."}],"container-title":["Computer Standards &amp; Interfaces"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548902001022?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548902001022?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T18:30:31Z","timestamp":1554402631000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0920548902001022"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,5]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2003,5]]}},"alternative-id":["S0920548902001022"],"URL":"https:\/\/doi.org\/10.1016\/s0920-5489(02)00102-2","relation":{},"ISSN":["0920-5489"],"issn-type":[{"value":"0920-5489","type":"print"}],"subject":[],"published":{"date-parts":[[2003,5]]}}}