{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:00:55Z","timestamp":1725494455098},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1109\/comsnets.2014.6734913","type":"proceedings-article","created":{"date-parts":[[2014,2,13]],"date-time":"2014-02-13T21:08:18Z","timestamp":1392325698000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Secure Personal Authentication through Remote System for E-Transactions (SPARSE)"],"prefix":"10.1109","author":[{"given":"V L","family":"Shivraj","sequence":"first","affiliation":[]},{"given":"M A","family":"Rajan","sequence":"additional","affiliation":[]},{"given":"P","family":"Balamuralidhar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Consumers' Trust in Electronic Commerce Transactions The Role of Perceived Privacy and Perceived Security","year":"2001","author":"chellappa","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-005-5879-y"},{"key":"1","article-title":"Information security issues in e-commerce","author":"david","year":"2001","journal-title":"SANS Security Essentials"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/11805588_10"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/11805588_10"},{"journal-title":"Implementing Keychain Management on Cisco LOS XR Software Cisco LOS XR System Security Configuration Guide","year":"0","key":"5"},{"key":"4","first-page":"1536","article-title":"A virtual password scheme to protect passwords","author":"ming","year":"2008","journal-title":"Proceedings of the ICC"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2013.6802866"},{"key":"8","article-title":"Search of an internet of things service architecture:REST or WS-*? A developers' perspective","author":"guinard","year":"2011","journal-title":"Proceedings of MobiQuitous"}],"event":{"name":"2014 Sixth International Conference on Communication Systems and Networks (COMSNETS)","start":{"date-parts":[[2014,1,6]]},"location":"Bangalore, India","end":{"date-parts":[[2014,1,10]]}},"container-title":["2014 Sixth International Conference on Communication Systems and Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6720258\/6734849\/06734913.pdf?arnumber=6734913","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T23:37:40Z","timestamp":1490312260000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6734913\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2014.6734913","relation":{},"subject":[],"published":{"date-parts":[[2014,1]]}}}