{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:38:16Z","timestamp":1743075496591,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030150341"},{"type":"electronic","value":"9783030150358"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-15035-8_43","type":"book-chapter","created":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T08:30:46Z","timestamp":1552552246000},"page":"459-470","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Sharing M-Coupons with Lightweight Computations via Cloud Computing"],"prefix":"10.1007","author":[{"given":"Iuon-Chang","family":"Lin","sequence":"first","affiliation":[]},{"given":"Hsiao-Chi","family":"Chiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,15]]},"reference":[{"issue":"2","key":"43_CR1","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.elerap.2004.10.006","volume":"4","author":"A Scharl","year":"2005","unstructured":"Scharl, A., Dickinger, A., Murphy, J.: Diffusion and success factors of mobile marketing. Electron. Commer. Res. Appl. 4(2), 159\u2013173 (2005)","journal-title":"Electron. Commer. Res. Appl."},{"key":"43_CR2","unstructured":"Neil, D.S.: Coupons: Identifying New Opportunities Beyond Early Trials. Jupiter Research Report (2008)"},{"key":"43_CR3","unstructured":"Juniper Research: Mobile Coupons (2008). \n                    http:\/\/www.juniperresearch.com"},{"key":"43_CR4","unstructured":"Raskino, M.: Mobile coupons will reach right into your pocket. GartnerGroup Research Note (2001). \n                    http:\/\/www.gartner.com\/"},{"key":"43_CR5","unstructured":"Kumar, M., Rangachari, A., Jhingran, A., Mohan, R.: Sales promotions on the internet. In: Proceedings of the 3rd USENIX Workshop on Electronic Commerce, pp. 167\u2013176 (1998)"},{"key":"43_CR6","doi-asserted-by":"crossref","unstructured":"Blundo, C., Cimato, S., De Bonis, A.: A lightweight protocol for the generation and distribution of secure e-coupons. In: Proceedings of the 11th International Conference on World Wide Web, Honolulu, Hawaii, USA, pp. 542\u2013552 (2002)","DOI":"10.1145\/511446.511517"},{"issue":"1","key":"43_CR7","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1023\/B:ELEC.0000045976.24984.48","volume":"5","author":"C Blundo","year":"2005","unstructured":"Blundo, C., Cimato, S., De Bonis, A.: Secure E-coupons. E-Commer. Res. 5(1), 117\u2013139 (2005)","journal-title":"E-Commer. Res."},{"issue":"1","key":"43_CR8","first-page":"273","volume":"6","author":"CC Chang","year":"2006","unstructured":"Chang, C.C., Wu, C.C., Lin, I.C.: A secure E-coupon system for mobile users. Int. J. Comput. Sci. Netw. Secur. 6(1), 273\u2013279 (2006)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"issue":"1","key":"43_CR9","first-page":"75","volume":"4","author":"J Wray","year":"2011","unstructured":"Wray, J., Plante, D.: Mobile advertising engine for centralized mobile coupon delivery. Int. J. Manag. Mark. Res. 4(1), 75\u201385 (2011)","journal-title":"Int. J. Manag. Mark. Res."},{"issue":"4","key":"43_CR10","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.elerap.2010.01.002","volume":"9","author":"SC Hsueh","year":"2010","unstructured":"Hsueh, S.C., Chen, J.M.: Sharing secure m-coupons for peer-generated targeting via eWOM communications. Electron. Commer. Res. Appl. 9(4), 283\u2013293 (2010)","journal-title":"Electron. Commer. Res. Appl."},{"key":"43_CR11","doi-asserted-by":"crossref","unstructured":"Ricest, R.L., Shamir, A.: PayWord and MicroMint: two simple micropayment schemes. In: Proceedings of 1996 International Workshop on Security Protocols, pp. 69\u201387 (1996)","DOI":"10.1007\/3-540-62494-5_6"},{"key":"43_CR12","unstructured":"Damgard, I.B.: A design principle for hash functions. In: Advances in Cryptology-CRYPTO 1989. LNCS, vol. 435, pp. 416\u2013427 (1990)"},{"key":"43_CR13","unstructured":"Merkle, R.C.: One way hash function and DES. In: Advances in Cryptology-CRYPTO 1989. LNCS, vol. 435, pp. 428\u2013446 (1989)"},{"issue":"1","key":"43_CR14","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/BF00203968","volume":"3","author":"RC Merkle","year":"1990","unstructured":"Merkle, R.C.: A fast software one-way hash function. J. Cryptol. 3(1), 43\u201358 (1990)","journal-title":"J. Cryptol."},{"key":"43_CR15","doi-asserted-by":"crossref","unstructured":"Davies, D.W.: A message authentication algorithm suitable for a main-frame computer. In: Advance in Cryptology-CRYPTO 1984. LNCS, vol. 196, pp. 393\u2013400 (1984)","DOI":"10.1007\/3-540-39568-7_30"},{"key":"43_CR16","unstructured":"ISO\/IEC 9797: Data cryptographic techniques-data integrity mechanism using a cryptographic check function employing a block cipher algorithm. Internal Organization for Standardization"},{"key":"43_CR17","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A Menezes","year":"1996","unstructured":"Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press Inc., Boca Raton (1996)"},{"key":"43_CR18","volume-title":"Smart Card Security and Applications","author":"M Hendry","year":"1997","unstructured":"Hendry, M.: Smart Card Security and Applications. Artech House, Norwood (1997)"},{"issue":"2","key":"43_CR19","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/S0955-1662(98)00008-3","volume":"13","author":"HWE Jones","year":"1998","unstructured":"Jones, H.W.E., Watson, A.C., O\u2019Neill, T.J.: Vehicle security using smartcards. Secur. J. 13(2), 79\u201387 (1998)","journal-title":"Secur. J."},{"key":"43_CR20","volume-title":"Applied Cryptography","author":"B Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography, 2nd edn. Wiley, Hoboken (1996)","edition":"2"},{"key":"43_CR21","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/s007990050008","volume":"1","author":"M Baldonado","year":"1997","unstructured":"Baldonado, M., Chang, C.-C.K., Gravano, L., Paepcke, A.: The stanford digital library metadata architecture. Int. J. Digit. Libr. 1, 108\u2013121 (1997)","journal-title":"Int. J. Digit. Libr."}],"container-title":["Advances in Intelligent Systems and Computing","Web, Artificial Intelligence and Network Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-15035-8_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T02:48:35Z","timestamp":1558147715000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-15035-8_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030150341","9783030150358"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-15035-8_43","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WAINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Workshops of  the International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Matsue","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 March 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 March 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"33","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"waina2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2019\/workshops.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}