{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:26:39Z","timestamp":1725549999656},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540240754"},{"type":"electronic","value":"9783540305552"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30555-2_51","type":"book-chapter","created":{"date-parts":[[2010,3,12]],"date-time":"2010-03-12T13:35:49Z","timestamp":1268400949000},"page":"441-451","source":"Crossref","is-referenced-by-count":6,"title":["MobiCoin: Digital Cash for M-Commerce"],"prefix":"10.1007","author":[{"given":"Ranjit","family":"Abbadasari","sequence":"first","affiliation":[]},{"given":"Ravi","family":"Mukkamala","sequence":"additional","affiliation":[]},{"given":"V. Valli","family":"Kumari","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"51_CR1","first-page":"1","volume":"54","author":"J. Carrara","year":"2001","unstructured":"Carrara, J., Legaspi, L.E.: SIM Cards: At the Heart of Digital Wireless Security. Annual Review of Communications\u00a054, 1\u201310 (2001)","journal-title":"Annual Review of Communications"},{"key":"51_CR2","unstructured":"Chan, S.-C: An Overview of Smart Card security (1997), http:\/\/home.hkstar.com\/~alanchan\/papers\/smartCardSecurity\/"},{"issue":"5","key":"51_CR3","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D., Fiat, A., Naor, N.: Transaction Systems To Make Big Brother Obsolete. Communications of the ACM\u00a028(5), 1030\u20131044 (1985)","journal-title":"Communications of the ACM"},{"key":"51_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/3-540-39118-5_21","volume-title":"Advances in Cryptology - EUROCRYPT \u201987","author":"D. Chaum","year":"1988","unstructured":"Chaum, D.: Blinding for unanticipated signatures. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol.\u00a0304, pp. 227\u2013233. Springer, Heidelberg (1988)"},{"key":"51_CR5","unstructured":"Chaum, D.: An introduction to ecash: DigiCash (1995), http:\/\/www.digicash.com"},{"key":"51_CR6","unstructured":"Cox, B., Tygar, J.D., Marrin, S.: Netbill Security and Transaction Protocol. In: First USENIX Workshop on Electronic Commerce, pp. 77\u201388 (1995)"},{"key":"51_CR7","doi-asserted-by":"crossref","unstructured":"De Bruijn, O., Spence, R., Chong, M.Y.: RSVP Browser: Web Browsing on Small Screen Devices. Personal and Ubiquitous Computing, 1\u20134 (2002)","DOI":"10.1007\/s007790200024"},{"key":"51_CR8","doi-asserted-by":"crossref","unstructured":"Dhem, J., Feyt, N.: Hardware and Software Symbiosis Helps Smart Card Evolution. IEEE MICRO, 14\u201325 (2001)","DOI":"10.1109\/40.977754"},{"issue":"2","key":"51_CR9","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/6.570827","volume":"34","author":"P.S. Gemmell","year":"1997","unstructured":"Gemmell, P.S.: Traceable E-cash. IEEE Spectrum\u00a034(2), 35\u201337 (1997)","journal-title":"IEEE Spectrum"},{"key":"51_CR10","unstructured":"Gordon, P., Gebauer, J.: M-Commerce: Revolution + Inertia = Evolution. IM Information Management and Consulting\u00a02 (2001)"},{"key":"51_CR11","unstructured":"Juul, N.C., J\u00f8rgensen, N.: Security Issues in Mobile Commerce using WAP. In: 15th Bled Electronic Commerce Conference, pp. 6\u201313 (2002)"},{"key":"51_CR12","doi-asserted-by":"crossref","unstructured":"Medvinsky, G., Clifford, B.: Netcash: A design for practical electronic currency on the internet. In: First ACM Conference on Computer and Communications Security, pp. 102\u2013106 (1993)","DOI":"10.1145\/168588.168601"},{"key":"51_CR13","doi-asserted-by":"crossref","unstructured":"Mukkamala, R., Balusani, S.: Active Certificates: A New Paradigm in Digital Certificate Management. In: International Conference on parallel Processing Workshops (ICPPW 2002), pp. 30\u201337 (2002)","DOI":"10.1109\/ICPPW.2002.1039709"},{"key":"51_CR14","doi-asserted-by":"crossref","unstructured":"Peha, M., Khamitov, M.: PayCash: A Secure Efficient Internet Payment System. In: 5th international conference on Electronic commerce, pp. 125\u2013130 (2003)","DOI":"10.1145\/948005.948022"},{"key":"51_CR15","unstructured":"Poutanen, T., Hinton, H., Stumm, M.: NetCents: A Lightweight Protocol for Secure Micropayments. In: Third USENIX Workshop on Electronic Commerce (1998)"},{"key":"51_CR16","doi-asserted-by":"crossref","unstructured":"Shelfer, K.M., Procaccino, J.D.: SmartCard Evolution. Communications of the ACM (2002)","DOI":"10.1145\/514236.514239"},{"key":"51_CR17","unstructured":"SmartTrust: SIM - software shift (2004), http:\/\/www.smarttrust.com\/sim\/default.asp"},{"key":"51_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1007\/3-540-48329-2_26","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"S. Brands","year":"1994","unstructured":"Brands, S.: Untraceable off-line cash in wallets with observers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 302\u2013318. Springer, Heidelberg (1994)"},{"key":"51_CR19","unstructured":"Steves, D.V., Yurkanan, C.E., Gouda, M.: An ACID Framework for Electronic Commerce (1998), http:\/\/www.cs.utexas.edu\/users\/dhs\/papers\/ictec_98\/forum.html"},{"key":"51_CR20","unstructured":"Tandon, R., Mandal, S., Saha, D.: M-commerce-Issues and Challenges. In: International conference on High performance Computing (2003)"},{"issue":"12","key":"51_CR21","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/953460.953489","volume":"46","author":"P. Tarasewich","year":"2003","unstructured":"Tarasewich, P.: Mobile commerce opportunities and challenges: Designing mobile commerce applications. Communications of the ACM\u00a046(12), 57\u201360 (2003)","journal-title":"Communications of the ACM"},{"key":"51_CR22","doi-asserted-by":"crossref","unstructured":"Tsalgatidou, A., Veijalainen, J.: Mobile Electronic Commerce: Emerging Issues. In: Proceedings of EC-We, pp. 477\u2013486 (2000)","DOI":"10.1007\/3-540-44463-7_42"},{"issue":"3","key":"51_CR23","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1023\/A:1014570512129","volume":"7","author":"U. Varshney","year":"2002","unstructured":"Varshney, U., Vetter, R.: Mobile Networks and Applications. Mobile Networks and Applications (MONET)\u00a07(3), 185\u2013198 (2002)","journal-title":"Mobile Networks and Applications (MONET)"},{"key":"51_CR24","unstructured":"Wang, H., Kranakis, E.: Secure Wireless Payment Protocol. In: Proceedings of ICT (2001)"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30555-2_51.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:21:58Z","timestamp":1605759718000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30555-2_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540240754","9783540305552"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30555-2_51","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}