1. Bhotvawala, M.A., Balihallimath, H., Bidichandani, N., Khond, M.P.: Growth of food tech: a comparative study of aggregator food delivery services in India. In: Proceedings of the 2016 International Conference on Industrial Engineering and Operations Management Detroit, Michigan, USA, 23–25 September 2016
2. Murdoch, S.J., Anderson, R.: Verified by visa and mastercard securecode: or, how not to design authentication. In: Murdoch, S.J., Anderson, R. (eds.) Financial Cryptography and Data Security 2010, 25–28 January 2010
3. Ismaili, H.E., Houmani, H., Madroumi, H.: A secure electronic transaction payment protocol design and implementation. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 5(5), 172–180 (2014)
4. Ahamad, S.S., Sastry, V.N., Udgata, S.B.: Enhanced mobile SET protocol with formal verification. In: 2012 Third International Conference on Computer and Communication Technology (ICCCT), 23–25 November 2012. doi:
10.1109/ICCCT.2012.65
,
http://ieeexplore.ieee.org/document/6394714
5. Stallings, W.: Cryptography and Network Security, 3rd edn.