{"id":"https://openalex.org/W2979648966","doi":"https://doi.org/10.1007/978-3-030-32101-7_13","title":"Designed to Be Broken: A Reverse Engineering Study of the 3D Secure 2.0 Payment Protocol","display_name":"Designed to Be Broken: A Reverse Engineering Study of the 3D Secure 2.0 Payment Protocol","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2979648966","doi":"https://doi.org/10.1007/978-3-030-32101-7_13","mag":"2979648966"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-32101-7_13","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-32101-7_13","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071538154","display_name":"Mohammed Aamir Ali","orcid":null},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Mohammed Aamir Ali","raw_affiliation_strings":["Newcastle University, Newcastle upon Tyne, UK"],"affiliations":[{"raw_affiliation_string":"Newcastle University, Newcastle upon Tyne, UK","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072969450","display_name":"Aad van Moorsel","orcid":"https://orcid.org/0000-0001-7233-6943"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Aad van Moorsel","raw_affiliation_strings":["Newcastle University, Newcastle upon Tyne, UK"],"affiliations":[{"raw_affiliation_string":"Newcastle University, Newcastle upon Tyne, UK","institution_ids":["https://openalex.org/I84884186"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5071538154"],"corresponding_institution_ids":["https://openalex.org/I84884186"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.4587,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.62985883,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"201","last_page":"221"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7957565784454346},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.6300780773162842},{"id":"https://openalex.org/keywords/issuer","display_name":"Issuer","score":0.6271415948867798},{"id":"https://openalex.org/keywords/credit-card","display_name":"Credit card","score":0.6143009066581726},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6113604307174683},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.5611497163772583},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5583667159080505},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5369484424591064},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.42870959639549255},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.27420520782470703},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.19418838620185852},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13250479102134705},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.10903415083885193},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.09965798258781433}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7957565784454346},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.6300780773162842},{"id":"https://openalex.org/C138170105","wikidata":"https://www.wikidata.org/wiki/Q1337949","display_name":"Issuer","level":2,"score":0.6271415948867798},{"id":"https://openalex.org/C2983355114","wikidata":"https://www.wikidata.org/wiki/Q161380","display_name":"Credit card","level":3,"score":0.6143009066581726},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6113604307174683},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5611497163772583},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5583667159080505},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5369484424591064},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.42870959639549255},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.27420520782470703},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.19418838620185852},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13250479102134705},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.10903415083885193},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09965798258781433},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-32101-7_13","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-32101-7_13","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6800000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1554296340","https://openalex.org/W1790746625","https://openalex.org/W1993861188","https://openalex.org/W2083150463","https://openalex.org/W2110986027","https://openalex.org/W2143190626","https://openalex.org/W2159510087","https://openalex.org/W2159566525","https://openalex.org/W2170920217","https://openalex.org/W2182062649","https://openalex.org/W2273478722","https://openalex.org/W2560850469","https://openalex.org/W2765227388","https://openalex.org/W2766980353","https://openalex.org/W4237130931"],"related_works":["https://openalex.org/W3123948588","https://openalex.org/W2917965976","https://openalex.org/W4213293283","https://openalex.org/W4238669341","https://openalex.org/W3121497650","https://openalex.org/W4254515016","https://openalex.org/W4254251480","https://openalex.org/W4206711434","https://openalex.org/W2059272164","https://openalex.org/W4387389211"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
