{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:56:35Z","timestamp":1729626995348,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/rait.2018.8388988","type":"proceedings-article","created":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T19:25:44Z","timestamp":1529954744000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Cryptanalysis and improvement of a cloud based login and authentication protocol"],"prefix":"10.1109","author":[{"given":"Subhasish","family":"Dhal","sequence":"first","affiliation":[]},{"given":"Vaibhav","family":"Bhuwan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Online banking gross transaction volume (GMV) in China from 2008 to 2018 (in trillion yuan)","year":"0","key":"ref10"},{"key":"ref11","first-page":"21","article-title":"Security, privacy and efficiency of internet banking transactions","author":"ronchi","year":"2011","journal-title":"Proceedings of the World Congress on Engineering 2011"},{"key":"ref12","first-page":"14","author":"hole","year":"2006","journal-title":"Case study Online Banking Security"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MTAS.2006.1700023","article-title":"Living with technology: gone phishing","author":"larcom","year":"2006","journal-title":"IEEE Technology and Society Magazine"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/CICYBS.2011.5949409","article-title":"Phishing detection using stochistic learning-based weak estimators","author":"zhan","year":"2011","journal-title":"Computational Intelligence in Cyber Security (CICS) IEEE Symposium"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575272"},{"key":"ref16","first-page":"271","article-title":"An enhanced remote authentication scheme to mitigate Man-in-the-browser attacks","author":"bin","year":"2012","journal-title":"Proceedings of the IEEE International Conference"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_3"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550368"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2013.02.015"},{"journal-title":"Enhancing Online Banking Transaction Authentication by Using Tamper Proof & Cloud Computing","year":"2015","author":"elhag","key":"ref3"},{"key":"ref6","first-page":"1","article-title":"The customertakes control","author":"sehlich","year":"2012","journal-title":"global consumer banking"},{"journal-title":"IBM White Paper","article-title":"Cloud computing for banking","year":"2013","key":"ref5"},{"key":"ref8","first-page":"1","article-title":"Cloud computing: strategic considerations for banking & financial services institutions","author":"suresh","year":"2010","journal-title":"TCS White Papers"},{"journal-title":"Core Banking In The Cloud Banking Software Solutions Vendor","year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655016"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511778476"},{"key":"ref9","first-page":"20","article-title":"Internet banking in India consumer concerns and bank marketing strategies","volume":"1","author":"habib","year":"2012","journal-title":"Journal of Science Research Management"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-015-0046-4"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/11751588_95"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1049\/el:20020380"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849285"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2011.14"}],"event":{"name":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","start":{"date-parts":[[2018,3,15]]},"location":"Dhanbad","end":{"date-parts":[[2018,3,17]]}},"container-title":["2018 4th International Conference on Recent Advances in Information Technology (RAIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8376941\/8388962\/08388988.pdf?arnumber=8388988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,19]],"date-time":"2019-10-19T23:43:34Z","timestamp":1571528614000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8388988\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/rait.2018.8388988","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}