{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T21:26:03Z","timestamp":1776893163289,"version":"3.51.2"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319651262","type":"print"},{"value":"9783319651279","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65127-9_25","type":"book-chapter","created":{"date-parts":[[2017,8,5]],"date-time":"2017-08-05T03:35:53Z","timestamp":1501904153000},"page":"313-324","source":"Crossref","is-referenced-by-count":18,"title":["Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks"],"prefix":"10.1007","author":[{"given":"Vasileios","family":"Mavroeidis","sequence":"first","affiliation":[]},{"given":"Mathew","family":"Nicho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,6]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Lin, P.Y., Chen, Y.H.: High payload secret hiding technology for QR codes. EURASIP J. Image Video Process. 2017(1), 14 (2017)","DOI":"10.1186\/s13640-016-0155-0"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 95\u2013109. IEEE (2012)","DOI":"10.1109\/SP.2012.16"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Kharraz, A., Kirda, E., Robertson, W., Balzarotti, D., Francillon, A.: Optical delusions: a study of malicious QR codes in the wild. In: 2014 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 192\u2013203. IEEE (2014)","DOI":"10.1109\/DSN.2014.103"},{"issue":"5","key":"25_CR4","first-page":"21","volume":"3","author":"V Sharma","year":"2012","unstructured":"Sharma, V.: A study of malicious QR codes. Int. J. Comput. Intell. Inf. Secur. 3(5), 21\u201326 (2012)","journal-title":"Int. J. Comput. Intell. Inf. Secur."},{"issue":"5","key":"25_CR5","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MITP.2012.72","volume":"14","author":"AK Jain","year":"2012","unstructured":"Jain, A.K., Shanbhag, D.: Addressing security and privacy risks in mobile applications. IT Prof. 14(5), 28\u201333 (2012)","journal-title":"IT Prof."},{"key":"25_CR6","unstructured":"Chaffey, D.: Mobile marketing statistics compilation. \nhttp:\/\/www.smartinsights.com\/mobile-marketing\/mobile-marketing-analytics\/mobile-marketing-statistics\/"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Kieseberg, P., Leithner, M., Mulazzani, M., Munroe, L., Schrittwieser, S., Sinha, M., Weippl, E.: QR code security. In: Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia, pp. 430\u2013435. ACM (2010)","DOI":"10.1145\/1971519.1971593"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 3\u201314. ACM (2011)","DOI":"10.1145\/2046614.2046618"},{"key":"25_CR9","unstructured":"Tapellini, D.: Smart phone thefts rose to 3.1 million in 2013 industry solution falls short, while legislative efforts to curb theft continue. \nhttp:\/\/www.consumerreports.org\/cro\/news\/2014\/04\/smart-phone-thefts-rose-to-3-1-million-last-year\/index.htm"},{"key":"25_CR10","unstructured":"Fedler, R., Sch\u00fctte, J., Kulicke, M.: On the effectiveness of malware protection on android. In: Fraunhofer AISEC, vol. 45 (2013)"},{"key":"25_CR11","unstructured":"Ramachandran, R., Oh, T., Stackpole, W.: Android anti-virus analysis. In: Annual Symposium on Information Assurance & Secure Knowledge Management, pp. 35\u201340. Citeseer (2012)"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Rouillard, J.: Contextual QR codes. In: The Third International Multi-conference on Computing in the Global Information Technology (ICCGI 2008), pp. 50\u201355. IEEE (2008)","DOI":"10.1109\/ICCGI.2008.25"},{"issue":"5","key":"25_CR13","doi-asserted-by":"crossref","first-page":"057004","DOI":"10.1117\/1.3126646","volume":"48","author":"WY Chen","year":"2009","unstructured":"Chen, W.Y., Wang, J.W.: Nested image steganography scheme using QR-barcode technique. Opt. Eng. 48(5), 057004 (2009)","journal-title":"Opt. Eng."},{"issue":"8","key":"25_CR14","first-page":"937","volume":"5","author":"KC Liao","year":"2010","unstructured":"Liao, K.C., Lee, W.H.: A novel user authentication scheme based on QR-code. JNW 5(8), 937\u2013941 (2010)","journal-title":"JNW"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Dabrowski, A., Krombholz, K., Ullrich, J., Weippl, E.R.: QR inception: barcode-in-barcode attacks. In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, pp. 3\u201310. ACM (2014)","DOI":"10.1145\/2666620.2666624"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Penning, N., Hoffman, M., Nikolai, J., Wang, Y.: Mobile malware security challeges and cloud-based detection. In: 2014 International Conference on Collaboration Technologies and Systems (CTS), pp. 181\u2013188. IEEE (2014)","DOI":"10.1109\/CTS.2014.6867562"},{"key":"25_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-319-07620-1_8","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"K Krombholz","year":"2014","unstructured":"Krombholz, K., Fr\u00fchwirt, P., Kieseberg, P., Kapsalis, I., Huber, M., Weippl, E.: QR code security: a survey of attacks and challenges for usable security. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 79\u201390. Springer, Cham (2014). doi:\n10.1007\/978-3-319-07620-1_8"},{"key":"25_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-642-41320-9_4","volume-title":"Financial Cryptography and Data Security","author":"T Vidas","year":"2013","unstructured":"Vidas, T., Owusu, E., Wang, S., Zeng, C., Cranor, L.F., Christin, N.: QRishing: the susceptibility of smartphone users to QR code phishing attacks. In: Adams, A.A., Brenner, M., Smith, M. (eds.) FC 2013. LNCS, vol. 7862, pp. 52\u201369. Springer, Heidelberg (2013). doi:\n10.1007\/978-3-642-41320-9_4"},{"key":"25_CR19","unstructured":"Deborah, M.: Security expert warns smartphone users of the risks in scanning cybercoding. \nhttp:\/\/www.post-gazette.com\/business\/businessnews\/2012\/06\/01\/Security-expert-warns-smartphone-users-of-the-risks-in-scanning-cybercoding\/stories\/201206010228"},{"issue":"5","key":"25_CR20","first-page":"468","volume":"4","author":"JC Chuang","year":"2010","unstructured":"Chuang, J.C., Hu, Y.C., Ko, H.J.: A novel secret sharing technique using QR code. Int. J. Image Process. (IJIP) 4(5), 468\u2013475 (2010)","journal-title":"Int. J. Image Process. (IJIP)"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Gao, J., Kulkarni, V., Ranavat, H., Chang, L., Mei, H.: A 2D barcode-based mobile payment system. In: Third International Conference on Multimedia and Ubiquitous Engineering (MUE 2009), pp. 320\u2013329. IEEE (2009)","DOI":"10.1109\/MUE.2009.62"},{"issue":"7","key":"25_CR22","first-page":"69","volume":"3","author":"AS Narayanan","year":"2012","unstructured":"Narayanan, A.S.: QR codes and security solutions. Int. J. Comput. Sci. Telecommun. 3(7), 69\u201371 (2012)","journal-title":"Int. J. Comput. Sci. Telecommun."},{"key":"25_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04101-3","volume-title":"Understanding Cryptography: A Textbook for Students and Practitioners","author":"C Paar","year":"2009","unstructured":"Paar, C., Pelzl, J.: Understanding Cryptography: A Textbook for Students and Practitioners. Springer, Heidelberg (2009). doi:\n10.1007\/978-3-642-04101-3"},{"key":"25_CR24","unstructured":"Peng, K., Sanabria, H., Wu, D., Zhu, C.: Security overview of QR codes. Student project in the MIT course 6.857,\u201914 (2014)"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65127-9_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,8]],"date-time":"2017-08-08T14:29:04Z","timestamp":1502202544000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65127-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319651262","9783319651279"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65127-9_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}