{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:31:58Z","timestamp":1742938318399,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685267"},{"type":"electronic","value":"9783319685274"}],"license":[{"start":{"date-parts":[[2017,9,24]],"date-time":"2017-09-24T00:00:00Z","timestamp":1506211200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-68527-4_10","type":"book-chapter","created":{"date-parts":[[2017,9,23]],"date-time":"2017-09-23T02:39:20Z","timestamp":1506134360000},"page":"88-97","source":"Crossref","is-referenced-by-count":0,"title":["Digital Certificate Based Security Payment for\u00a0QR Code Applications"],"prefix":"10.1007","author":[{"given":"Jing","family":"Zhang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shi-Jian","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jeng-Shyang","family":"Pan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiao-Rong","family":"Ji","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,9,24]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Krombholz, K., Frhwirt, P., Kieseberg, P., Kapsalis, I., Huber, M., Weippl, E.: QR code security: a survey of attacks and challenges for usable security. In: Human Aspects of Information Security, Privacy, and Trust, HAS 2014. LNCS, vol. 8533, pp. 79\u201390 (2014)","DOI":"10.1007\/978-3-319-07620-1_8"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Krombholz, K., Fr\u00fchwirt, P., Rieder, T., Kapsalis, I., Ullrich, J.: QR code security\u2013how secure and usable apps can protect users against malicious QR codes. In: International Conference on Availability, Reliability and Security, pp. 230\u2013237. IEEE (2015)","DOI":"10.1109\/ARES.2015.84"},{"key":"10_CR3","unstructured":"Mary, G., Rani, M.S.: Security augmentation of visual cryptography using watermarking embedded QR code. In: International Conference on Signal Processing, Control and Data Analytics (2016)"},{"issue":"06","key":"10_CR4","first-page":"34","volume":"04","author":"AR Wane","year":"2013","unstructured":"Wane, A.R., Jamankar, S.P., Chandure, O.V.: An effective mechanism for ensuring security of QR code. Int. J. Adv. Res. Comput. Sci. 04(06), 34 (2013)","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Umaria, M.M., Jethava, G.B.: Enhancing the data storage capacity in QR code using compression algorithm and achieving security and further data storage capacity improvement using multiplexing. In: International Conference on Computational Intelligence and Communication Networks, pp. 1094\u20131096 (2015)","DOI":"10.1109\/CICN.2015.215"},{"issue":"04","key":"10_CR6","first-page":"336","volume":"3","author":"S Kartheshwar","year":"2015","unstructured":"Kartheshwar, S.: QR code based security system to prevent unauthorized access. Int. J. Stud. Res. Technol. Manag. 3(04), 336\u2013339 (2015)","journal-title":"Int. J. Stud. Res. Technol. Manag."},{"issue":"332","key":"10_CR7","first-page":"36","volume":"332","author":"ZP Wang","year":"2014","unstructured":"Wang, Z.P., Zhang, S., Liu, H.Z., Qin, Y.: Single-intensity-recording optical encryption technique based on phase retrieval algorithm and QR code. Opt. Commun. 332(332), 36\u201341 (2014)","journal-title":"Opt. Commun."},{"issue":"2","key":"10_CR8","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1109\/TCE.2011.5955222","volume":"57","author":"HC Huang","year":"2011","unstructured":"Huang, H.C., Chang, F.C., Fang, W.C.: Reversible data hiding with histogram-based difference expansion for QR code applications. IEEE Trans. Consum. Electron. 57(2), 779\u2013787 (2011)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"17","key":"10_CR9","doi-asserted-by":"crossref","first-page":"20268","DOI":"10.1364\/OE.22.020268","volume":"22","author":"JF Barrera","year":"2014","unstructured":"Barrera, J.F., Vlez, A., Torroba, R.: Experimental scrambling and noise reduction applied to the optical encryption of QR codes. Opt. Express 22(17), 20268 (2014)","journal-title":"Opt. Express"},{"key":"10_CR10","unstructured":"Information technology-Automatic identification and data capture techniques-QR Code 2005 bar code symbology specification. ISO\/IEC 18004 (2006)"},{"issue":"3","key":"10_CR11","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1002\/dac.2683","volume":"28","author":"RA Sahu","year":"2015","unstructured":"Sahu, R.A., Padhye, S.: Provable secure identity-based multi-proxy signature scheme. Int. J. Commun. Sys. 28(3), 497\u2013512 (2015)","journal-title":"Int. J. Commun. Sys."},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Proceedings of Advances in Cryptolog, CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1984)","DOI":"10.1007\/3-540-39568-7_5"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Mittra, P., Rakesh, N.: A desktop application of QR code for data security and authentication. In: International Conference on Inventive Computation Technologies. IEEE (2017)","DOI":"10.1109\/INVENTIVE.2016.7824809"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Purnomo, A.T., Gondokaryono, Y.S., Kim, C.S.: Mutual authentication in securing mobile payment system using encrypted QR code based on public key infrastructure. In: International Conference on System Engineering and Technology, pp. 194\u2013198. IEEE (2017)","DOI":"10.1109\/FIT.2016.7857564"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Aulya, R., Hindersah, H., Prihatmanto, A.S., Rhee, K.H.: An authenticated passengers based on dynamic QR code for Bandung smart transportation systems. In: Engineering Seminar. IEEE (2017)","DOI":"10.1109\/INAES.2016.7821900"},{"key":"10_CR16","first-page":"1","volume":"2017","author":"J Lu","year":"2017","unstructured":"Lu, J., Yang, Z., Li, L., Yuan, W., Li, L., Chang, C.C.: Multiple schemes for mobile payment authentication using QR code and visual cryptography. Mob. Inf. Syst. 2017, 1\u201312 (2017)","journal-title":"Mob. Inf. Syst."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68527-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T18:00:26Z","timestamp":1570125626000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68527-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,24]]},"ISBN":["9783319685267","9783319685274"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68527-4_10","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,9,24]]}}}