{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T03:57:11Z","timestamp":1754020631715,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811385803"},{"type":"electronic","value":"9789811385810"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-8581-0_33","type":"book-chapter","created":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T11:04:44Z","timestamp":1561460684000},"page":"411-424","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Cryptanalysis of a Secure and Privacy Preserving Mobile Wallet Scheme with Outsourced Verification in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Debarpan","family":"Tribedi","sequence":"first","affiliation":[]},{"given":"Dipanwita","family":"Sadhukhan","sequence":"additional","affiliation":[]},{"given":"Sangram","family":"Ray","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,26]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Yu, X., Kywe, S.M., Li, Y.: Security issues of in-store mobile payment. In: Handbook of Blockchain, Digital Finance, and Inclusion, vol. 2 (2017)","key":"33_CR1","DOI":"10.1016\/B978-0-12-812282-2.00006-1"},{"unstructured":"Smith, S.M., et al.: System and method of conducting transactions using a mobile wallet system. U.S. Patent Application (2010)","key":"33_CR2"},{"doi-asserted-by":"crossref","unstructured":"Sakalauskas, E., Muleravicius, J., Timofejeva, I.: Computational resources for mobile e-wallet system with observers. In: ELECTRONICS 2017, Palanga, pp. 1\u20135. IEEE (2017)","key":"33_CR3","DOI":"10.1109\/ELECTRONICS.2017.7995226"},{"doi-asserted-by":"crossref","unstructured":"Kenneth, W.: Mobile payments, digital wallets and tunnel vision. In: Biometric Technology Today, pp. 8\u20139. Elsevier (2011)","key":"33_CR4","DOI":"10.1016\/S0969-4765(11)70171-0"},{"doi-asserted-by":"crossref","unstructured":"Feifei, W.: Research on security of mobile payment model based on trusted third party. In: Second International Conference on Network Security Wireless Communication and Trusted Computing (NSWCTC), Wuhan, pp. 442\u2013445. IEEE (2010)","key":"33_CR5","DOI":"10.1109\/NSWCTC.2010.110"},{"issue":"1","key":"33_CR6","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.adhoc.2015.05.020","volume":"36","author":"R Amin","year":"2016","unstructured":"Amin, R., Biswas, G.P.: A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw. 36(1), 58\u201380 (2016)","journal-title":"Ad Hoc Netw."},{"key":"33_CR7","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.pmcj.2015.08.001","volume":"24","author":"S Kalra","year":"2015","unstructured":"Kalra, S., Sood, S.K.: Secure authentication scheme for IoT and cloud servers. Pervasive Mob. Comput. 24, 210\u2013223 (2015)","journal-title":"Pervasive Mob. Comput."},{"doi-asserted-by":"crossref","unstructured":"Ray, S., Biswas, G.P.: An ECC based public key infrastructure usable for mobile applications. In: Second International Conference on Computational Science, Engineering and Information Technology, pp. 562\u2013568. ACM (2012)","key":"33_CR8","DOI":"10.1145\/2393216.2393310"},{"issue":"3","key":"33_CR9","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1007\/s11277-016-3393-7","volume":"90","author":"S Ray","year":"2016","unstructured":"Ray, S., Biswas, G.P., Dasgupta, M.: Secure multi-purpose mobile-banking using elliptic curve cryptography. Wirel. Pers. Commun. 90(3), 1331\u20131354 (2016)","journal-title":"Wirel. Pers. Commun."},{"key":"33_CR10","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.adhoc.2014.03.009","volume":"20","author":"M Turkanovi\u0107","year":"2014","unstructured":"Turkanovi\u0107, M., Brumen, B., H\u00f6lbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw. 20, 96\u20131129 (2014)","journal-title":"Ad Hoc Netw."},{"key":"33_CR11","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.csi.2016.11.012","volume":"54","author":"Z Qin","year":"2017","unstructured":"Qin, Z., Sun, J., Wahaballa, A., Zheng, W., Xiong, H., Qin, Z.: A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing. Comput. Stan. Interfaces 54, 55\u201360 (2017)","journal-title":"Comput. Stan. Interfaces"},{"unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practices. Pearson Education India (2006)","key":"33_CR12"},{"doi-asserted-by":"crossref","unstructured":"Veeraraghavan, P.: Pseudo-identity based encryption and its application in mobile ad hoc networks. In: 2011 IEEE 10th Malaysia International Conference on Communications (MICC), Malaysia, pp. 49\u201352. IEEE (2011)","key":"33_CR13","DOI":"10.1109\/MICC.2011.6150298"},{"key":"33_CR14","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1016\/j.proeng.2012.01.890","volume":"30","author":"SK Islam","year":"2012","unstructured":"Islam, S.K., Biswas, G.P.: An improved pairing-free identity-based authenticated key agreement protocol based on ECC. Procedia Eng. 30, 499\u2013507 (2012)","journal-title":"Procedia Eng."},{"issue":"17","key":"33_CR15","doi-asserted-by":"publisher","first-page":"4650","DOI":"10.1002\/sec.1655","volume":"9","author":"R Amin","year":"2016","unstructured":"Amin, R., Biswas, G.P., Giri, D., Khan, M.K., Kumar, N.: A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments. Secur. Commun. Netw. 9(17), 4650\u20134666 (2016)","journal-title":"Secur. Commun. Netw."},{"key":"33_CR16","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.csi.2017.09.008","volume":"56","author":"Y Liao","year":"2018","unstructured":"Liao, Y., He, Y., Li, F., Zhou, S.: Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement. Comput. Stan. Interfaces 56, 101\u2013106 (2018)","journal-title":"Comput. Stan. Interfaces"},{"issue":"6","key":"33_CR17","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1016\/j.chb.2009.06.001","volume":"25","author":"D Shin","year":"2009","unstructured":"Shin, D.: Towards an understanding of the consumer acceptance of mobile wallet. Comput. Hum. Behav. 25(6), 1343\u20131354 (2009)","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"33_CR18","doi-asserted-by":"publisher","first-page":"94","DOI":"10.4067\/S0718-18762012000100008","volume":"7","author":"DL Amoroso","year":"2012","unstructured":"Amoroso, D.L., Watanabe, R.M.: Building a research model for mobile wallet consumer adoption: the case of mobile Suica in Japan. J. Theor. Appl. Electron. Commerce Res. 7(1), 94\u2013110 (2012)","journal-title":"J. Theor. Appl. Electron. Commerce Res."},{"issue":"2","key":"33_CR19","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1049\/iet-ifs.2011.0004","volume":"6","author":"Y Yu","year":"2012","unstructured":"Yu, Y., Mu, Y., Wang, G., Xia, Q., Yang, B.: Improved certificateless signature scheme provably secure in the standard model. IET Inf. Secur. 6(2), 102\u2013110 (2012)","journal-title":"IET Inf. Secur."},{"issue":"12","key":"33_CR20","doi-asserted-by":"publisher","first-page":"2327","DOI":"10.1109\/TIFS.2014.2363553","volume":"9","author":"H Xiong","year":"2014","unstructured":"Xiong, H.: Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Trans. Inf. Forensics Secur. 9(12), 2327\u20132339 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"33_CR21","doi-asserted-by":"publisher","first-page":"2259","DOI":"10.1007\/s11277-012-0935-5","volume":"71","author":"V Coskun","year":"2013","unstructured":"Coskun, V., Ozdenizci, B., Ok, K.: A survey on near field communication (NFC) technology. Wirel. Pers. Commun. 71(3), 2259\u20132294 (2013)","journal-title":"Wirel. Pers. Commun."},{"doi-asserted-by":"crossref","unstructured":"Luo, Y., Fu, S., Huang, K., Wang, D., Xu, M.: Securely outsourcing of bilinear pairings with untrusted servers for cloud storage. In: Trustcom\/BIGDATASE\/ISPA, IEEE 2016, Tianjin, pp. 623\u2013629. IEEE (2016)","key":"33_CR22","DOI":"10.1109\/TrustCom.2016.0118"},{"unstructured":"Dutta, R., Barua, R., Sarkar, P.: Pairing-based cryptography: a survey. Cryptology ePrint Archive, Report 2004\/064 (2004)","key":"33_CR23"},{"key":"33_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/3-540-44987-6_28","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2001","author":"R Canetti","year":"2001","unstructured":"Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453\u2013474. Springer, Heidelberg (2001). \n                    https:\/\/doi.org\/10.1007\/3-540-44987-6_28"},{"issue":"1\u20132","key":"33_CR25","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.csi.2007.08.010","volume":"30","author":"HB Chen","year":"2008","unstructured":"Chen, H.B., Chen, T.H., Lee, W.B., Chang, C.C.: Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks. Comput. Stan. Interfaces 30(1\u20132), 95\u201399 (2008)","journal-title":"Comput. Stan. Interfaces"},{"issue":"3","key":"33_CR26","doi-asserted-by":"publisher","first-page":"2261","DOI":"10.1007\/s11071-014-1584-x","volume":"78","author":"SK Islam","year":"2014","unstructured":"Islam, S.K.: Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps. Nonlinear Dyn. 78(3), 2261\u20132276 (2014)","journal-title":"Nonlinear Dyn."},{"issue":"3","key":"33_CR27","doi-asserted-by":"publisher","first-page":"2013","DOI":"10.1007\/s11277-015-2542-8","volume":"84","author":"SK Islam","year":"2015","unstructured":"Islam, S.K., Khan, M.K., Obaidat, M.S., Muhaya, F.: Provably secure and anonymous password authentication protocol for roaming service in global mobility networks using extended chaotic maps. Wirel. Pers. Commun. 84(3), 2013\u20132034 (2015)","journal-title":"Wirel. Pers. Commun."},{"issue":"3","key":"33_CR28","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.jksus.2017.01.003","volume":"29","author":"SK Islam","year":"2017","unstructured":"Islam, S.K., Amin, R., Biswas, G.P., Farash, M.S., Li, X., Kumari, S.: An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments. J. King Saud Univ.-Comput. Inf. Sci. 29(3), 311\u2013324 (2017)","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"doi-asserted-by":"crossref","unstructured":"Sadhukhan, D., Ray, S.: Cryptanalysis of an elliptic curve cryptography based lightweight authentication scheme for smart grid communication. In: 2018 IEEE 4th International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, pp. 1\u20136. IEEE (2018)","key":"33_CR29","DOI":"10.1109\/RAIT.2018.8389040"}],"container-title":["Communications in Computer and Information Science","Computational Intelligence, Communications, and Business Analytics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-8581-0_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,27]],"date-time":"2019-06-27T03:53:06Z","timestamp":1561607586000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-8581-0_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811385803","9789811385810"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-8581-0_33","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"26 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CICBA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Intelligence, Communications, and Business Analytics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kalyani","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cicba2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cicba.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"240","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"76","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.74","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}