{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:42:42Z","timestamp":1743082962380,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030387518"},{"type":"electronic","value":"9783030387525"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-38752-5_33","type":"book-chapter","created":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T20:02:41Z","timestamp":1578427361000},"page":"424-438","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Design and Implementation of a Secure Mobile Banking System Based on Elliptic Curve Integrated Encryption Schema"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0184-7241","authenticated-orcid":false,"given":"Ahmad","family":"Salim","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2589-5317","authenticated-orcid":false,"given":"Ali Makki","family":"Sagheer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1035-5767","authenticated-orcid":false,"given":"Linha","family":"Yaseen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,8]]},"reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Nosrati, L.: A review of mobile banking security. In: IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) (2016)","DOI":"10.1109\/CCECE.2016.7726820"},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Pukkasenunk, P., Sukkasem, S.: An efficient of secure mobile phone application for multiple bill payments. In: 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 487\u2013492 (2016)","DOI":"10.1109\/WAINA.2016.63"},{"key":"33_CR3","unstructured":"Sanou, B.: Facts & Figures\u00a02015. ICT Facts & Figures (2015)"},{"key":"33_CR4","unstructured":"10 of the hottest trends in consumer behaviour in 2015 (2015). http:\/\/www.manager.co.th\/Weekly54\/ViewNews.aspx?NewsID=9560000157612&TabID=3&"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Khan, W.A., Saleem, Y., Shah, G.A., Farooq, A.: Modified mobile transaction authentication number system for 2-layer security. In: 2016 International Conference on Intelligent Systems Engineering (ICISE) (2016)","DOI":"10.1109\/INTELSE.2016.7475167"},{"key":"33_CR6","doi-asserted-by":"crossref","unstructured":"Mondal, P.C., Deb, R., Huda, M.N.: Transaction authorization from Know Your Customer (KYC) information in online banking. In: 2016 9th International Conference on Electrical and Computer Engineering (ICECE), pp. 523\u2013526 (2016)","DOI":"10.1109\/ICECE.2016.7853972"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Singh, R.K., Pais, A.R.: Secure web based single sign-on (SSO) framework using identity-based encryption system. In: 2009 International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2009, pp. 430\u2013432 (2009)","DOI":"10.1109\/ARTCom.2009.82"},{"key":"33_CR8","unstructured":"Bairagi, A.K., Abdullah-Al-Nahid: A new approach of E-banking through the use of mobile, post-office and VPN in the perspective of Bangladesh. IJCIT 2(1), 36\u201341 (2011)"},{"key":"33_CR9","series-title":"AISC","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/978-3-319-01854-6_60","volume-title":"International Joint Conference SOCO\u201913-CISIS\u201913-ICEUTE\u201913","author":"M Markovi\u00e1","year":"2014","unstructured":"Markovi\u00e1, M., \u0110jor\u0111jevi\u0107, G.: Secure android application in SOA-based mobile government and mobile banking systems. In: Herrero, \u00c1., et al. (eds.) International Joint Conference SOCO\u201913-CISIS\u201913-ICEUTE\u201913. AISC, vol. 239, pp. 589\u2013599. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-01854-6_60"},{"key":"33_CR10","unstructured":"Kivisaari, T., et al.: Providing Secure Web Services for Mobile Applications (2015)"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Putra, D.S.K., Sadikin, M.A., Windarta, S.: S-Mbank: secure mobile banking authentication scheme using signcryption, pair based text authentication, and contactless smart card. In: 2017 15th International Conference on Quality in Research (QiR): International Symposium on Electrical and Computer Engineering, pp. 230\u2013234 (2017)","DOI":"10.1109\/QIR.2017.8168487"},{"key":"33_CR12","doi-asserted-by":"crossref","DOI":"10.1201\/b17668","volume-title":"Introduction to Modern Cryptography","author":"J Katz","year":"2014","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography. CRC Press, Boca Raton (2014)"},{"key":"33_CR13","first-page":"7","volume":"1999","author":"M Abdalla","year":"1999","unstructured":"Abdalla, M., Bellare, M., Rogaway, P.: DHAES: an encryption scheme based on the Diffie-Hellman problem. IACR Cryptol. ePrint Arch. 1999, 7 (1999)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"33_CR14","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/3-540-45353-9_12","volume-title":"Topics in Cryptology \u2014 CT-RSA 2001","author":"Michel Abdalla","year":"2001","unstructured":"Abdalla, M., Bellare, M., Rogaway, P.: The oracle Diffie-Hellman assumptions and an analysis of DHIES. In: Cryptographers Track at the RSA Conference, pp. 143\u2013158 (2001)"},{"issue":"4","key":"33_CR15","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"33_CR16","doi-asserted-by":"publisher","DOI":"10.1515\/9781400885626","volume-title":"The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption","author":"J Holden","year":"2017","unstructured":"Holden, J.: The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption. Princeton University Press, Princeton (2017)"},{"key":"33_CR17","unstructured":"McGrew, D., Viega, J.: The Galois\/counter mode of operation (GCM). Submission to NIST Modes of Operation Process, vol. 20 (2004)"},{"issue":"1","key":"33_CR18","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1109\/TC.2010.147","volume":"60","author":"K Jankowski","year":"2011","unstructured":"Jankowski, K., Laurent, P.: Packed AES-GCM algorithm suitable for AES\/PCLMULQDQ instructions. IEEE Trans. Comput. 60(1), 135\u2013138 (2011)","journal-title":"IEEE Trans. Comput."},{"issue":"4","key":"33_CR19","doi-asserted-by":"publisher","first-page":"34","DOI":"10.5815\/ijmsc.2018.04.03","volume":"4","author":"AS Bader","year":"2018","unstructured":"Bader, A.S., Sagheer, A.M.: Modification on AES-GCM to increment ciphertext randomness. Int. J. Math. Sci. Comput. (IJMSC) 4(4), 34\u201340 (2018). https:\/\/doi.org\/10.5815\/ijmsc.2018.04.03","journal-title":"Int. J. Math. Sci. Comput. (IJMSC)"}],"container-title":["Communications in Computer and Information Science","Applied Computing to Support Industry: Innovation and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-38752-5_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,15]],"date-time":"2021-02-15T17:38:29Z","timestamp":1613410709000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-38752-5_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030387518","9783030387525"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-38752-5_33","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"8 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACRIT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Computing to Support Industry: Innovation and Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ramadi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Iraq","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acrit2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acritt.org.uk\/wp\/acrit-conferences\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"159","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}