{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:41:12Z","timestamp":1729662072611,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1109\/icoin.2015.7057869","type":"proceedings-article","created":{"date-parts":[[2015,3,13]],"date-time":"2015-03-13T20:58:20Z","timestamp":1426280300000},"page":"127-132","source":"Crossref","is-referenced-by-count":4,"title":["An accountability model for Internet transactions"],"prefix":"10.1109","author":[{"given":"Chian","family":"Techapanupreeda","sequence":"first","affiliation":[]},{"given":"Roongroj","family":"Chokngamwong","sequence":"additional","affiliation":[]},{"given":"Chalee","family":"Thammarat","sequence":"additional","affiliation":[]},{"given":"Supakorn","family":"Kungpisdan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/AINA.2010.167"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/EEE.2005.133"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ITCC.2004.1286423"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/49.839935"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1016\/S0140-3664(02)00049-X"},{"key":"ref15","first-page":"287","article-title":"Concurrent signatures","volume":"3027","author":"chen","year":"2004","journal-title":"Advances in Cryptology - Eurocrypt"},{"key":"ref16","first-page":"14","article-title":"Perfect concurrent signature schemes","volume":"3269","author":"susilo","year":"2004","journal-title":"ICICS 2004 Lecture Notes in Computer Science"},{"key":"ref17","first-page":"435","article-title":"The fairness of perfect concurrent signatures","volume":"4307","author":"gui-lin","year":"2006","journal-title":"In ICICS&#x2019; 06 LNCS"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/ICCEE.2008.24"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"946","DOI":"10.1080\/01402382.2010.486119","article-title":"Two Concepts of Accountability: Accountability as a Virtue and as a Mechanism","volume":"33","author":"mark","year":"2010","journal-title":"West European Politics"},{"key":"ref4","first-page":"443","article-title":"Privacy in New Mobile Payment Protocol","volume":"47","author":"soo","year":"2008","journal-title":"World Academy of Science Engineering and Technology"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/3-540-45861-1_21"},{"key":"ref6","first-page":"345","article-title":"A Sound Logic For Analyzing Electronic Commerce Protocols","author":"kessler","year":"1998","journal-title":"Proceedings of European Symposium on Research in Computer Security"},{"key":"ref5","first-page":"228","article-title":"Accountability Analysis of Mobile Payment Protocol","author":"soo","year":"0","journal-title":"International Conference on Computer Engineering and Network Security (ICCENS&#x2018;2012)"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ICEBE.2007.12"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-24582-7_22","article-title":"Lightweight Mobile Credit-Card Payment Protocol","author":"kungpisdan","year":"2003","journal-title":"Proc Indocrypt 2003"},{"key":"ref2","article-title":"Modelling, Design, and Analysis of Secure Mobile Payment Systems","volume":"2288","author":"kungpisdan","year":"2002"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/32.502224"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/ICEBE.2008.24"},{"year":"2003","author":"brinkerhoff","article-title":"Accountability and Health Systems: Overview, Framework, and Strategies","key":"ref20"},{"year":"2013","author":"arti","article-title":"A Study of Literature Review on Individual Accountability","key":"ref22"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/CBMS.2003.1212787"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/ISCIT.2009.5341001"},{"key":"ref23","first-page":"162","article-title":"A Lightweight and Private Mobile Payment Protocol by Using Mobile Network Operator","author":"soo","year":"2008","journal-title":"Proceedings of the International Conference on Computer and Communication Engineering"}],"event":{"name":"2015 International Conference on Information Networking (ICOIN)","start":{"date-parts":[[2015,1,12]]},"location":"Cambodia","end":{"date-parts":[[2015,1,14]]}},"container-title":["2015 International Conference on Information Networking (ICOIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7051394\/7057846\/07057869.pdf?arnumber=7057869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T07:19:49Z","timestamp":1498202389000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7057869\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icoin.2015.7057869","relation":{},"subject":[],"published":{"date-parts":[[2015,1]]}}}