{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T06:41:44Z","timestamp":1725864104578},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319458700"},{"type":"electronic","value":"9783319458717"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45871-7_9","type":"book-chapter","created":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T08:25:24Z","timestamp":1472113524000},"page":"130-146","source":"Crossref","is-referenced-by-count":9,"title":["AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash"],"prefix":"10.1007","author":[{"given":"Bo","family":"Yang","sequence":"first","affiliation":[]},{"given":"Kang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zhenfeng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Dengguo","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,26]]},"reference":[{"key":"9_CR1","unstructured":"Limited ARM: ARM security technology-building a secure system using TrustZone technology, April 2009"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1007\/11426639_18","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"JL Camenisch","year":"2005","unstructured":"Camenisch, J.L., Hohenberger, S., Lysyanskaya, A.: Compact e-cash. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302\u2013321. Springer, Heidelberg (2005)"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1007\/978-3-540-72540-4_28","volume-title":"Advances in Cryptology - EUROCRYPT 2007","author":"S Canard","year":"2007","unstructured":"Canard, S., Gouget, A.: Divisible e-cash systems can be truly anonymous. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 482\u2013497. Springer, Heidelberg (2007)"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/978-3-662-46447-2_4","volume-title":"Public-Key Cryptography \u2013 PKC 2015","author":"S Canard","year":"2015","unstructured":"Canard, S., Pointcheval, D., Sanders, O., Traor\u00e9, J.: Divisible e-cash made practical. In: Katz, J. (ed.) PKC 2015. LNCS, vol. 9020, pp. 77\u2013100. Springer, Heidelberg (2015)"},{"key":"9_CR5","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/978-1-4757-0602-4_18","volume-title":"Advances in Cryptology","author":"D Chaum","year":"1983","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199\u2013203. Springer, New York (1983)"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2007. LNCS, vol. 4727, pp. 63\u201380. Springer, Heidelberg (2007)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Li, W., Li, H., Chen, H., Xia, Y.: AdAttester: secure online mobile advertisement attestation using TrustZone. In: Proceedings of MobiSys 2015, pp. 75\u201388. ACM (2015)","DOI":"10.1145\/2742647.2742676"},{"issue":"2","key":"9_CR8","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1016\/j.elerap.2007.05.003","volume":"7","author":"AS Lim","year":"2008","unstructured":"Lim, A.S.: Inter-consortia battles in mobile payments standardisation. Electron. Commer. Res. Appl. 7(2), 202\u2013213 (2008)","journal-title":"Electron. Commer. Res. Appl."},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/978-3-662-47854-7_13","volume-title":"Financial Cryptography and Data Security","author":"S Preibusch","year":"2015","unstructured":"Preibusch, S., Peetz, T., Acar, G., Berendt, B.: Purchase details leaked to PayPal (short paper). In: B\u00f6hme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 217\u2013226. Springer, Heidelberg (2015)"},{"key":"9_CR10","unstructured":"Reaves, B., Scaife, N., Bates, A., Traynor, P., Butler, K.R.B.: Mo(bile) money, mo(bile) problems: analysis of branchless banking applications in the developing world. In: Proceedings of the 24th USENIX Conference on Security Symposium (2015)"},{"key":"9_CR11","unstructured":"Rial, A.: Privacy-preserving e-commerce protocols. Ph.D. thesis, Faculty of Engineering Science, KU Leuven, March 2013"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: 44th ACM\/IEEE DAC 2007, pp. 9\u201314 (2007)","DOI":"10.1145\/1278480.1278484"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Sun, H., Sun, K., Wang, Y., Jing, J.: Trust OTP: transforming smartphones into secure one-time password tokens. In: Proceedings of CCS 2015, pp. 976\u2013988. ACM (2015)","DOI":"10.1145\/2810103.2813692"},{"key":"9_CR14","unstructured":"GlobalPlatform: Tee client API specification version 1.0 (2010)"},{"key":"9_CR15","unstructured":"Integrated Silicon Solution Inc, IS61LV6416-10TL. http:\/\/www.alldatasheet.com\/datasheet-pdf\/pdf\/505020\/ISSI\/IS61LV6416-10TL.html"},{"key":"9_CR16","unstructured":"ISO\/IEC: 15946\u20135: 2009 Information Technology-Security Techniques: Cryptographic Techniques based on Elliptic Curves: Part 5: Elliptic Curve Generation (2009)"},{"key":"9_CR17","unstructured":"Proxama (2015). http:\/\/www.proxama.com\/platform\/ . Accessed 15 Oct 2015"},{"key":"9_CR18","unstructured":"Xilinx: Zynq-7000 all programmable soc zc702 evaluation kit. http:\/\/www.xilinx.com\/products\/boards-and-kits\/EK-Z7-ZC702-G.htm"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Yang, B., Feng, D., Qin, Y.: A lightweight anonymous mobile shopping scheme based on DAA for trusted mobile platform. In: IEEE TrustCom 2014, pp. 9\u201317. IEEE (2014)","DOI":"10.1109\/TrustCom.2014.6"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/978-3-319-25417-3","volume-title":"Trust and Trustworthy Computing","author":"B Yang","year":"2015","unstructured":"Yang, B., Yang, K., Qin, Y., Zhang, Z., Feng, D.: DAA-TZ: an efficient DAA scheme for mobile devices using ARM TrustZone. In: Conti, M., Schunter, M., Askoxylakis, I. (eds.) TRUST 2015. LNCS, vol. 9229, pp. 209\u2013227. Springer, Heidelberg (2015)"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Yang, B., Yang, K., Zhang, Z., Qin, Y., Feng, D.: AEP-M: practical anonymous e-payment for mobile devices using ARM Trust Zone and divisible e-cash (full version). ePrint (2016)","DOI":"10.1007\/978-3-319-45871-7_9"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Zhao, S., Zhang, Q., Hu, G., Qin, Y., Feng, D.: Providing root of trust for ARM trust zone using on-chip SRAM. In: Proceedings of TrustED 2014, pp. 25\u201336. ACM (2014)","DOI":"10.1145\/2666141.2666145"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45871-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T23:15:27Z","timestamp":1568330127000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45871-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319458700","9783319458717"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45871-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}