{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:51:37Z","timestamp":1725889897996},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319596075"},{"type":"electronic","value":"9783319596082"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59608-2_10","type":"book-chapter","created":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T11:29:56Z","timestamp":1497353396000},"page":"182-198","source":"Crossref","is-referenced-by-count":1,"title":["Tokenisation Blacklisting Using Linkable Group\u00a0Signatures"],"prefix":"10.1007","author":[{"given":"Assad","family":"Umar","sequence":"first","affiliation":[]},{"given":"Iakovos","family":"Gurulian","sequence":"additional","affiliation":[]},{"given":"Keith","family":"Mayes","sequence":"additional","affiliation":[]},{"given":"Konstantinos","family":"Markantonakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,14]]},"reference":[{"key":"10_CR1","unstructured":"Identification cards - Identification of issuers - Part 1: Numbering system. ISO\/IEC 7812\u20131. Standard, International Organization for Standardization, Geneva, CH (2015)"},{"key":"10_CR2","unstructured":"The UKCARDS Association. Card expenditure statistics, January"},{"key":"10_CR3","unstructured":"International Organization for Standardization (ISO). Identification cards - Contactless integrated circuit cards - Proximity cards (2008)"},{"key":"10_CR4","unstructured":"Yeager, D.: Added NFC Reader support for two new tag types: ISO PCD type A and ISO PCD type B (2012)"},{"key":"10_CR5","unstructured":"Android Developer Guide. Host-based Card Emulation. https:\/\/developer.android.com\/guide\/topics\/connectivity\/nfc\/hce.html"},{"key":"10_CR6","unstructured":"MNFCC-14002: Host Card Emulation (HCE) 101, SmartCardAlliance, Technical report MNFCC-14002, August 2004. http:\/\/www.smartcardalliance.org\/downloads\/HCE-101-WP-FINAL-081114-clean.pdf"},{"key":"10_CR7","doi-asserted-by":"publisher","unstructured":"Umar, A., Mayes, K., Markantonakis, K.: Performance variation in host-based card emulation compared to a hardware security element. In: Mobile and Secure Services (MOBISECSERV), pp. 1\u20136, February 2015. doi: 10.1109\/MOBISECSERV.2015.7072872","DOI":"10.1109\/MOBISECSERV.2015.7072872"},{"key":"10_CR8","series-title":"Artech House Computer Security Series","volume-title":"Implementing Electronic Card Payment Systems","author":"C Radu","year":"2003","unstructured":"Radu, C.: Implementing Electronic Card Payment Systems. Artech House Computer Security Series. Artech House, USA (2003)"},{"key":"10_CR9","unstructured":"Samsung Pay Will Transform the Mobile Wallet Experience. Standard, Samsung Electronics Co. Ltd. (2016)"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"JR Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251\u2013260. Springer, Heidelberg (2002). doi: 10.1007\/3-540-45748-8_24"},{"key":"10_CR11","unstructured":"Information technology - Security techniques - Anonymous digital signatures. Standard, International Organization for Standardization, Geneva, CH (2013)"},{"key":"10_CR12","first-page":"189","volume-title":"List Signature Schemes","author":"S Canard","year":"2006","unstructured":"Canard, S., Schoenmakers, B., Stam, M., Traor\u00e9, J.: List Signature Schemes, vol. 154, pp. 189\u2013201. Elsevier Science Publishers B.V., Amsterdam (2006)"},{"key":"10_CR13","unstructured":"Brakewood, C.E.: Contactless Prepaid and Bankcards in Transit Fare Collection Systems, June 2010"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Arfaoui, G., Dabosville, G., Gambs, S., Lacharme, P., Lalande, J.-F.: A Privacy-Preserving NFC Mobile Pass for Transport Systems, vol. 2, p. e4 (2014)","DOI":"10.4108\/mca.2.5.e4"},{"key":"10_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-642-32298-3_4","volume-title":"Trusted Systems","author":"J-E Ekberg","year":"2012","unstructured":"Ekberg, J.-E., Tamrakar, S.: Mass transit ticketing with NFC mobile phones. In: Chen, L., Yung, M., Zhu, L. (eds.) INTRUST 2011. LNCS, vol. 7222, pp. 48\u201365. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-32298-3_4"},{"key":"10_CR16","unstructured":"Transport Committee: The Future of Ticketing. Greater London Authority (2011)"},{"key":"10_CR17","volume-title":"Contactless Transit Framework","author":"B Krikorian-Slade","year":"2016","unstructured":"Krikorian-Slade, B., Burholt, N.M.A.: Contactless Transit Framework. Standard and Cards Association, UK (2016)"},{"key":"10_CR18","unstructured":"Annual Fraud Indicator: Report. University of Portsmouth, Centre for Counter Fraud Studies, Portsmouth, England (2016)"},{"key":"10_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/3-540-39200-9_17","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"C Gentry","year":"2003","unstructured":"Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272\u2013293. Springer, Heidelberg (2003). doi: 10.1007\/3-540-39200-9_17"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"EMV Payment Tokenisation Specification. Standard (2014)","DOI":"10.1016\/S1361-3723(14)70539-1"},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1993","author":"S Brands","year":"1994","unstructured":"Brands, S., Chaum, D.: Distance-bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344\u2013359. Springer, Heidelberg (1994). doi: 10.1007\/3-540-48285-7_30"},{"key":"10_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/3-540-69053-0_33","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1997","author":"N Bari\u0107","year":"1997","unstructured":"Bari\u0107, N., Pfitzmann, B.: Collision-free accumulators and fail-stop signature schemes without trees. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 480\u2013494. Springer, Heidelberg (1997). doi: 10.1007\/3-540-69053-0_33"},{"key":"10_CR23","first-page":"925","volume-title":"A Survey of Electronic Ticketing Applied to Transport","author":"M Mut-Puigserver","year":"2012","unstructured":"Mut-Puigserver, M., Magdalena Payeras-Capell\u00ed, M., Ferrer-Gomila, J.-L., Vives-Guasch, A., Castell\u00ed-Roca, J.: A Survey of Electronic Ticketing Applied to Transport, vol. 31, pp. 925\u2013939. Elsevier Advanced Technology Publications, Oxford (2012)"},{"key":"10_CR24","unstructured":"Potzmader, K.: ISO20008-2.2 Group Signature Scheme Evaluation on Mobile Devices (2013)"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Potzmader, K., Winter, J., Hein, D., Hanser, C., Teufl, P., Chen, L.: Group Signatures on Mobile Devices: Practical Experiences, pp. 47\u201364 (2013)","DOI":"10.1007\/978-3-642-38908-5_4"},{"key":"10_CR26","unstructured":"Bassil, Y.: A comparative study on the performance of the top DBMS systems (2012). abs\/1205.2889"},{"key":"10_CR27","first-page":"255","volume-title":"A Practical and Provably Secure Coalition-Resistant Group Signature Scheme","author":"G Ateniese","year":"2000","unstructured":"Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme, pp. 255\u2013270. Springer, London (2000)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59608-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T21:01:25Z","timestamp":1569445285000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59608-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319596075","9783319596082"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59608-2_10","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}