{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T16:33:53Z","timestamp":1694622833830},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[1984,5,1]],"date-time":"1984-05-01T00:00:00Z","timestamp":452217600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Select. Areas Commun."],"published-print":{"date-parts":[[1984,5]]},"DOI":"10.1109\/jsac.1984.1146072","type":"journal-article","created":{"date-parts":[[2004,4,29]],"date-time":"2004-04-29T00:28:59Z","timestamp":1083198539000},"page":"414-422","source":"Crossref","is-referenced-by-count":2,"title":["Communications Security for Electronic Funds Transfer Systems"],"prefix":"10.1109","volume":"2","author":[{"given":"J.","family":"Gait","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/0376-5075(79)90007-2"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1147\/sj.172.0126"},{"key":"ref33","author":"karger","year":"1977","journal-title":"Non-discretionary access control for distributed computer systems"},{"key":"ref32","author":"kahn","year":"1967","journal-title":"The Codebreakers"},{"key":"ref31","year":"0"},{"key":"ref30","first-page":"87","article-title":"DES chips find a new niche","author":"iversen","year":"1981","journal-title":"Electronics"},{"key":"ref37","author":"linden","year":"1976","journal-title":"Security Analysis and Enhancements of Computer Operating Systems"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CMPCON.1979.729098"},{"key":"ref35","author":"kent","year":"1980","journal-title":"Protocols and Techniques for Data Communication Networks"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1499799.1499818"},{"key":"ref60","author":"voydock","year":"1981","journal-title":"Security in higher level protocols"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.6028\/NBS.SP.500-21v2","author":"heinrich","year":"1978","journal-title":"The network security center A system level approach"},{"key":"ref27","year":"1981","journal-title":"Guidelines for Implementing and using the NBS data encryption standard"},{"key":"ref29","first-page":"90","article-title":"How to bust the bank with a $1000 computer rig","year":"1981","journal-title":"Bus Week"},{"key":"ref2","year":"1975","journal-title":"Introduction to automated tellers"},{"key":"ref1","year":"1982","journal-title":"Financial Institution Message Authentication"},{"key":"ref20","article-title":"A hierarchical basis for encryption key management in a computer communications network: Trends and applications","author":"everton","year":"1978","journal-title":"1978 Proc IEEE Comput Soc"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/775396.775403"},{"key":"ref21","year":"1976","journal-title":"Introduction to EFT Security"},{"key":"ref24","first-page":"99","article-title":"The EFT revolution","author":"glaser","year":"1978","journal-title":"Proc 3rd Jerus Conf Inform Tech"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.1984.1146072"},{"key":"ref26","first-page":"7","article-title":"Equity funding: Fraud by computer","volume":"80","author":"grimes","year":"1973","journal-title":"A mer Federationist"},{"key":"ref25","first-page":"50","article-title":"Allocating EFT liability?Who's responsible for what","author":"greguras","year":"1980","journal-title":"Cashflow"},{"key":"ref50","year":"1980","journal-title":"General Security Requirements for Equipment Using the Data Encryption Standard"},{"key":"ref51","year":"1981","journal-title":"Interoperability and Security Requirements for Use of the Data Encryption Standard in the Network and Transport Layers of Data Communications"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1981.1095071"},{"key":"ref58","doi-asserted-by":"crossref","DOI":"10.6028\/NBS.SP.500-54","author":"smid","year":"1979","journal-title":"A key notarization system for computer networks"},{"key":"ref57","author":"rabin","year":"1978","journal-title":"Foundations of Secure Computations"},{"key":"ref56","author":"price","year":"1981","journal-title":"Issues in the design of a key distribution center"},{"key":"ref55","article-title":"Thieves fail in try to rob by computer","year":"1980","journal-title":"Wash Post"},{"key":"ref54","year":"1976","journal-title":"Introduction to point of sale systems"},{"key":"ref53","year":"1980","journal-title":"American National Standard for Personal Identification Number Management and Security"},{"key":"ref52","year":"1981","journal-title":"Interoperability and Security Requirements for Use of the Data Encryption Standard in the Physical and Data Link Layers of Data Communications"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CMPCON.1979.729099"},{"key":"ref11","author":"chaum","year":"1981","journal-title":"Design concepts for tamper-responding systems"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1499799.1499819"},{"key":"ref12","author":"chorley","year":"1982","journal-title":"A revised definition of a secure communications protocol and its implementation"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4684-3578-8"},{"key":"ref14","author":"davies","year":"1979","journal-title":"A protocol for secure communications"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/359138.359143"},{"key":"ref16","year":"1977","journal-title":"Data encryption standard"},{"key":"ref17","first-page":"185","article-title":"Systems auditability and control in an EFTS environment","author":"dewey","year":"1976","journal-title":"Proc AFIPS"},{"key":"ref18","year":"1977","journal-title":"Systems Performance Specifications for AUTODIN"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1147\/sj.172.0106"},{"key":"ref4","article-title":"Safety PIN?Can it keep card systems secure","author":"azzarone","year":"1978","journal-title":"Bank Systems and Equipment"},{"key":"ref3","year":"1981","journal-title":"American National Standard for Financial Institution Message Authentication"},{"key":"ref6","author":"baran","year":"1964","journal-title":"Security secrecy and tamperfree considerations"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1499799.1499820"},{"key":"ref8","article-title":"Security aspects of computer networks","author":"branstad","year":"1973","journal-title":"AIAA Comp Network Sys Conf"},{"key":"ref7","author":"bequai","year":"1981","journal-title":"The Cashless Society EFTS at the Crossroads"},{"key":"ref49","first-page":"10","article-title":"How to steal one million","author":"peltu","year":"1980","journal-title":"New Scientist"},{"key":"ref9","article-title":"Encryption protection in computer data communications","author":"branstad","year":"1975","journal-title":"IEEE 4th Data Communications Symp"},{"key":"ref46","year":"1977","journal-title":"National Commission on EFT"},{"key":"ref45","year":"1980","journal-title":"DES Modes of Operation"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/359178.359183"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1981.10011"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/800081.802661"},{"key":"ref44","year":"0"},{"key":"ref43","first-page":"69","article-title":"Bank data networks: Moving millions electronically","author":"mier","year":"1981","journal-title":"Data Commun"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx6\/49\/25808\/01146072.pdf?arnumber=1146072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:25:48Z","timestamp":1638217548000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1146072\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1984,5]]},"references-count":60,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1984,5]]}},"URL":"https:\/\/doi.org\/10.1109\/jsac.1984.1146072","relation":{},"ISSN":["0733-8716"],"issn-type":[{"value":"0733-8716","type":"print"}],"subject":[],"published":{"date-parts":[[1984,5]]}}}