{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T23:40:02Z","timestamp":1748734802549,"version":"3.41.0"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319259147"},{"type":"electronic","value":"9783319259154"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25915-4_18","type":"book-chapter","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T09:43:45Z","timestamp":1451382225000},"page":"340-362","source":"Crossref","is-referenced-by-count":0,"title":["SOLDI: Secure Off-Line Disposable CredIts to Secure Mobile Micro Payments"],"prefix":"10.1007","author":[{"given":"Vanesa","family":"Daza","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[]},{"given":"Flavio","family":"Lombardi","sequence":"additional","affiliation":[]},{"given":"Matteo","family":"Signorini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"key":"18_CR1","unstructured":"Martins, S., Yang, Y.: Introduction to bitcoins: a pseudo-anonymous electronic currency system. In: Conference of the Center for Advanced Studies on Collaborative Research, CASCON 2011, pp. 349\u2013350. IBM Corp., Riverton (2011)"},{"key":"18_CR2","doi-asserted-by":"publisher","first-page":"30","DOI":"10.4018\/jgim.2011070102","volume":"19","author":"W Wresch","year":"2011","unstructured":"Wresch, W., Fraser, S.: Persistent barriers to e-commerce in developing countries: a longitudinal study of efforts by caribbean companies. J. Glob. Inf. Manage. 19, 30\u201344 (2011)","journal-title":"J. Glob. Inf. Manage."},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Chen, W., Hancke, G., Mayes, K., Lien, Y., Chiu, J.H.: Using 3G network components to enable NFC mobile transactions and authentication. In: IEEE PIC 2010, vol. 1, pp. 441\u2013448 (2010)","DOI":"10.1109\/PIC.2010.5687587"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Golovashych, S.: The technology of identification and authentication of financial transactions. From smart cards to NFC-terminals. In: IEEE IDAACS 2005, pp. 407\u2013412 (2005)","DOI":"10.1109\/IDAACS.2005.283013"},{"key":"18_CR5","unstructured":"Gonzales-Vasco, M., Heidarvand, S., Villar, J.: Anonymous subscription schemes: a flexible construction for on-line services access. In: SECRYPT 2010, pp. 1\u201312 (2010)"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Kadambi, K.S., Li, J., Karp, A.H.: Near-field communication-based secure mobile payment service. In: ICEC 2009. ACM (2009)","DOI":"10.1145\/1593254.1593276"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Sekhar, V.C., Mrudula, S.: A complete secure customer centric anonymous payment in a digital ecosystem. In: International Conference on Computing, Electronics and Electrical Technologies (ICCEET), pp. 1049\u20131054 (2012)","DOI":"10.1109\/ICCEET.2012.6203889"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Dominikus, S., Aigner, M.: mcoupons: An application for near field communication (nfc). In: International Conference on Advanced Information Networking and Applications Workshops, AINAW 2007, pp. 421\u2013428. IEEE Computer Society, Washington, DC (2007)","DOI":"10.1109\/AINAW.2007.230"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Nishide, T., Sakurai, K.: Security of offline anonymous electronic cash systems against insider attacks by untrusted authorities revisited. In: International Conference on Intelligent Networking and Collaborative Systems, INCOS 2011, pp. 656\u2013661. IEEE Computer Society, Washington, DC (2011)","DOI":"10.1109\/INCoS.2011.146"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Patil, V., Shyamasundar, R.K.: An efficient, secure and delegable micro-payment system. In: International Conference on e-Technology, e-Commerce and e-Service, IEEE 2004, pp. 394\u2013404. IEEE Computer Society, Washington, DC (2004)","DOI":"10.1109\/EEE.2004.1287338"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Aigner, M., Dominikus, S., Feldhofer, M.: A system of secure virtual coupons using NFC technology. In: International Conference on Pervasive Computing and Communications, pp. 362\u2013366. IEEE (2007)","DOI":"10.1109\/PERCOMW.2007.15"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Juang, W. S.: An efficient and practical fair buyer-anonymity exchange scheme using bilinear pairings. In: Asia JCIS, pp. 19\u201326 (2013)","DOI":"10.1109\/ASIAJCIS.2013.11"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Salama, M.A., El-Bendary, N., Hassanien, A.E.: Towards secure mobile agent based e-cash system. In: 1st International Workshop on Security and Privacy Preserving in e-Societies, pp. 1\u20136. ACM, New York (2011)","DOI":"10.1145\/2107581.2107582"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Dai, X., Ayoade, O., Grundy, J.: Off-line micro-payment protocol for multiple vendors in mobile commerce. In: International Conference on Parallel and Distributed Computing Applications and Technologies, PDCAT 2006, pp. 197\u2013202. IEEE Computer Society, Washington, DC (2006)","DOI":"10.1109\/PDCAT.2006.83"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Popescu, C., Oros, H.: An off-line electronic cash system based on bilinear pairings. In: EURASIP 2007, pp. 438\u2013440 (2007)","DOI":"10.1109\/IWSSIP.2007.4381135"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Zhou, X.: Threshold cryptosystem based fair off-line e-cash. In: IITA 2008, vol. 3, pp. 692\u2013696 (2008)","DOI":"10.1109\/IITA.2008.87"},{"key":"18_CR17","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/TDSC.2007.70228","volume":"5","author":"A Srivastava","year":"2008","unstructured":"Srivastava, A., Kundu, A., Sural, S., Majumdar, A.: Credit card fraud detection using hidden markov model. IEEE Trans. Dependable Secure Comput. 5, 37\u201348 (2008)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Wang, C., Lu, R.: An ID-based transferable off-line e-cash system with revokable anonymity. In: International Symposium on Electronic Commerce and Security 2008, pp. 758\u2013762 (2008)","DOI":"10.1109\/ISECS.2008.81"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Zhan-gang, W., Zhen-kai, W.: A secure off-line electronic cash scheme based on ECDLP. In: ETCS 2009, vol. 2, pp. 30\u201333 (2009)","DOI":"10.1109\/ETCS.2009.269"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Wang, C., Sun, H., Zhang, H., Jin, Z.: An improved off-line electronic cash scheme. In: ICCIS 2013, pp. 438\u2013441 (2013)","DOI":"10.1109\/ICCIS.2013.122"},{"key":"18_CR21","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.csi.2013.08.011","volume":"36","author":"BK Chaurasia","year":"2014","unstructured":"Chaurasia, B.K., Verma, S.: Secure pay while on move toll collection using VANET. Comput. Stand. Interfaces 36, 403\u2013411 (2014)","journal-title":"Comput. Stand. Interfaces"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Daza, V., Di Pietro, R., Lombardi, F., Signorini, M.: Force: fully off-line secure credits for mobile micro payments. In: 11th International Conference on Security and Cryptography, SCITEPRESS (2014)","DOI":"10.5220\/0005053201250136"},{"key":"18_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-642-24861-0_21","volume-title":"Information Security","author":"K Rechert","year":"2011","unstructured":"Rechert, K., Meier, K., Greschbach, B., Wehrle, D., von Suchodoletz, D.: Assessing location privacy in mobile communication networks. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol. 7001, pp. 309\u2013324. Springer, Heidelberg (2011)"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Bond, M., Choudary, O., Murdoch, S.J., Skorobogatov, S., Anderson, R.: Chip and skim: cloning emv cards with the pre-play attack. In: 2014 IEEE Symposium on Security and Privacy (SP), pp. 49\u201364 (2014)","DOI":"10.1109\/SP.2014.11"},{"key":"18_CR25","unstructured":"Group, C.R.: Alina & other pos malware. Technical report, Cymru (2013)"},{"key":"18_CR26","unstructured":"Incorporated, T.M.: Point-of-sale system breaches. Technical report, Trend Micro Incorporated (2014)"},{"key":"18_CR27","volume-title":"Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions","author":"S Gomzin","year":"2014","unstructured":"Gomzin, S.: Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions, 1st edn. Wiley Publishing, London (2014)","edition":"1"},{"key":"18_CR28","volume-title":"Point of Sale (POS) Systems and Security","author":"W Whitteker","year":"2014","unstructured":"Whitteker, W.: Point of Sale (POS) Systems and Security. Thesis, SANS Institute (2014)"},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"Murdoch, S., Drimer, S., Anderson, R., Bond, M.: Chip and pin is broken. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 433\u2013446 (2010)","DOI":"10.1109\/SP.2010.33"},{"key":"18_CR30","unstructured":"Bianco, D., Laurie, A., Barisani, A.: Chip and pin is definitely broken. credit card skimming and pin harvesting in an emv. Technical report, InversePath and ApertureLabs (2011)"},{"key":"18_CR31","doi-asserted-by":"publisher","DOI":"10.1002\/9781119965794","volume-title":"Near Field Communication: From Theory to Practice","author":"V Coskun","year":"2012","unstructured":"Coskun, V., Ok, K., Ozdenizci, B.: Near Field Communication: From Theory to Practice, 1st edn. Wiley Publishing, London (2012)","edition":"1"},{"key":"18_CR32","unstructured":"Ravikanth, P.S.: Physical one-way functions. Ph.D. thesis, Massachusetts Institute of Technology (2001)"},{"key":"18_CR33","unstructured":"Rens, B.J.E.V.: Authentication using a read-once memory (2006). http:\/\/www.google.com\/patents\/US7059533 . Accessed 30 July 2013"},{"key":"18_CR34","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y Dodis","year":"2008","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38, 97\u2013139 (2008)","journal-title":"SIAM J. Comput."},{"key":"18_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-642-04138-9_24","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"R Maes","year":"2009","unstructured":"Maes, R., Tuyls, P., Verbauwhede, I.: Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 332\u2013347. Springer, Heidelberg (2009)"},{"key":"18_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-642-23951-9_24","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"M-DM Yu","year":"2011","unstructured":"Yu, M.-D.M., M\u2019Raihi, D., Sowell, R., Devadas, S.: Lightweight and secure PUF key storage using limits of machine learning. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 358\u2013373. Springer, Heidelberg (2011)"},{"key":"18_CR37","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","volume":"13","author":"D Lim","year":"2005","unstructured":"Lim, D., Lee, J.W., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Trans. Very Large Scale Integr. Syst. 13, 1200\u20131205 (2005)","journal-title":"IEEE Trans. Very Large Scale Integr. Syst."},{"key":"18_CR38","doi-asserted-by":"crossref","unstructured":"Choi, P., Kim, D.K.: Design of security enhanced TPM chip against invasive physical attacks. In: IEEE ISCAS 2012, pp. 1787\u20131790 (2012)","DOI":"10.1109\/ISCAS.2012.6271612"},{"key":"18_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1007\/3-540-46035-7_35","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"S Vaudenay","year":"2002","unstructured":"Vaudenay, S.: Security flaws induced by CBC padding - applications to SSL, IPSEC, WTLS. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 534\u2013546. Springer, Heidelberg (2002)"},{"key":"18_CR40","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1109\/TVLSI.2011.2135868","volume":"20","author":"WP Griffin","year":"2012","unstructured":"Griffin, W.P., Raghunathan, A., Roy, K.: Clip: circuit level ic protection through direct injection of process variations. IEEE Trans. Very Large Scale Integr. Syst. 20, 791\u2013803 (2012)","journal-title":"IEEE Trans. Very Large Scale Integr. Syst."}],"container-title":["Communications in Computer and Information Science","E-Business and Telecommunications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25915-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T23:26:52Z","timestamp":1748734012000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25915-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319259147","9783319259154"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25915-4_18","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]}}}