{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:30:05Z","timestamp":1725471005231},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540377436"},{"type":"electronic","value":"9783540377450"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11823865_15","type":"book-chapter","created":{"date-parts":[[2006,9,18]],"date-time":"2006-09-18T15:16:52Z","timestamp":1158592612000},"page":"142-151","source":"Crossref","is-referenced-by-count":2,"title":["Seamlessness and Privacy Enhanced Ubiquitous Payment"],"prefix":"10.1007","author":[{"given":"Kyoung Jun","family":"Lee","sequence":"first","affiliation":[]},{"given":"Mu Jeong","family":"Jeong","sequence":"additional","affiliation":[]},{"given":"Jeong-In","family":"Ju","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"A. Acquisti","year":"2002","unstructured":"Acquisti, A.: Protecting Privacy with Economics: Economic Incentives for Preventive Technologies in Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498. Springer, Heidelberg (2002)"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Boddupalli, P., Al-Bin-Ali, F., Davies, N., Friday, A., Storz, O., Wu, M.: Payment Support in Ubiquitous Computing Environments. In: IEEE Workshop on Mobile Computing Systems and Applications, pp. 110\u2013121 (2003)","DOI":"10.1109\/MCSA.2003.1240772"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Floerkemeier, C., Schneider, R., Langheinrich, M.: Scanning with a Purpose \u2013 Supporting the Fair Information Principles in RFID Protocols, Institute for Pervasive Computing (2004)","DOI":"10.1007\/11526858_17"},{"key":"15_CR4","unstructured":"Gross, S., Fleisch, E., Lampe, M., M\u00fcller, R.: Requirements and Technologies for Ubiquitous Payment, Multikonferenz Wirtschaftsinformat, Techniques and Applications for Mobile Commerce (2004)"},{"key":"15_CR5","unstructured":"Kourouthanasis, P., Spinellis, D., Roussos, G., Giaglis, G.: Intelligent cokes and diapers: MyGrocer ubiquitous computing environment. In: First International Mobile Business Conference, pp. 150\u2013172 (2002)"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-45427-6_23","volume-title":"Ubicomp 2001: Ubiquitous Computing","author":"M. Langheinrich","year":"2001","unstructured":"Langheinrich, M.: Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol.\u00a02201, pp. 273\u2013291. Springer, Heidelberg (2001)"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/3-540-45809-3_19","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"M. Langheinrich","year":"2002","unstructured":"Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, pp. 237\u2013245. Springer, Heidelberg (2002)"},{"issue":"6","key":"15_CR8","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/s00779-004-0307-6","volume":"8","author":"G. Roussos","year":"2004","unstructured":"Roussos, G., Moussouri, T.: Consumer perceptions of privacy, security and trust in ubiquitous commerce. Personal and Ubiquitous Computing\u00a08(6), 416\u2013429 (2004)","journal-title":"Personal and Ubiquitous Computing"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Seigneur, J., Jensen, C.D.: Trust Enhanced Ubiquitous Payment without Too Much Privacy Loss. In: Proceedings of the 19th Annual ACM Symposium on Applied Computing, vol.\u00a003, pp. 1593\u20131599 (2004)","DOI":"10.1145\/967900.968218"},{"key":"15_CR10","unstructured":"Zugenmaier, A., Hohl, A.: Anonymity for Users of Ubiquitous Computing. In: Security-Workshop at UbiComp (2003)"}],"container-title":["Lecture Notes in Computer Science","E-Commerce and Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11823865_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:17:24Z","timestamp":1605644244000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11823865_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540377436","9783540377450"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11823865_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}