{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T18:09:14Z","timestamp":1721498954699},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2011,8,7]],"date-time":"2011-08-07T00:00:00Z","timestamp":1312675200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1007\/s00779-011-0436-7","type":"journal-article","created":{"date-parts":[[2011,8,6]],"date-time":"2011-08-06T05:44:23Z","timestamp":1312609463000},"page":"643-654","source":"Crossref","is-referenced-by-count":13,"title":["Resuscitating privacy-preserving mobile payment with customer in complete control"],"prefix":"10.1007","volume":"16","author":[{"given":"Divyan Munirathnam","family":"Konidala","sequence":"first","affiliation":[]},{"given":"Made Harta","family":"Dwijaksara","sequence":"additional","affiliation":[]},{"given":"Kwangjo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Dongman","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Byoungcheon","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Daeyoung","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Soontae","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,7]]},"reference":[{"key":"436_CR1","unstructured":"Abe M, Okamato T (2000) Provably secure partially blind signature. In: proceedings of annual international cryptology conference. LNCS 1880:271\u2013286"},{"key":"436_CR2","doi-asserted-by":"crossref","unstructured":"Balakrishnan M, Mohomed I, Ramasubramanian V (2009) Where\u2019s that phone?: geolocating IP addresses on 3G networks. Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, pp 294\u2013300","DOI":"10.1145\/1644893.1644928"},{"key":"436_CR3","unstructured":"Brands S (1993) Untraceable off-line cash in wallets with observers. In: Proceedings of annual international cryptology conference, pp 302\u2013318, ISBN 3-540-57766-1"},{"key":"436_CR4","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.cose.2004.05.008","volume":"24\u20131","author":"T Cao","year":"2005","unstructured":"Cao T, Lin D, Xue R (2005) A randomized RSA-based partially blind signature scheme for electronic cash. Comput Secur 24\u20131:44\u201349","journal-title":"Comput Secur"},{"key":"436_CR5","unstructured":"Chaum D, Fiat A, Naor M (1988) Untraceable electronic cash. In: Proceedings of annual international cryptology conference, pp 319\u2013327, ISBN 3-540-97196-3"},{"key":"436_CR6","unstructured":"Chaum D (1982) Blind signatures for untraceable payments. In: Proceedings of annual international cryptology conference, pp 199\u2013203"},{"key":"436_CR7","unstructured":"EPCglobal Inc website. http:\/\/www.EPCglobalinc.org"},{"key":"436_CR8","unstructured":"EPCglobal Specification, The EPCglobal architecture framework. http:\/\/www.epcglobalinc.org\/standards\/"},{"key":"436_CR9","unstructured":"Gartner Inc. (2009) Dataquest Insight: mobile payment, 2007\u20132012. http:\/\/www.gartner.com\/it\/page.jsp?id=995812"},{"key":"436_CR10","unstructured":"Hayashi F (2009) Do US consumers really benefit from payment card rewards?. Econ Rev, First Quarter, Federal Reserve Bank of Kansas City, https:\/\/www.kansascityfed.org\/Publicat\/ECONREV\/PDF\/09q1Hayashi.pdf"},{"key":"436_CR11","unstructured":"Heydt-Benjamin TS, Bailey DV, Fu K, Juels A, O\u2019Hare T (2007) Vulnerabilities in first-generation RFID-enabled credit cards. In: Proceedings of eleventh international conference on financial cryptography and data security. LNCS 4886, pp 2\u201314"},{"key":"436_CR12","unstructured":"Internet Engineering Task Force (IETF), Network Working Group, Rescorla E (2000) \u201cHTTP Over TLS\u201d, RFC2818. http:\/\/tools.ietf.org\/html\/rfc2818"},{"key":"436_CR13","unstructured":"ISO\/IEC 14443-1\u223c4 (2008) Identification cards\u2014contactless integrated circuit cards\u2014proximity cards. http:\/\/www.iso.org\/iso\/iso_catalogue\/catalogue_tc\/catalogue_detail.htm?csnumber=39693"},{"key":"436_CR14","unstructured":"ISO\/IEC 18092, Near Field Communication Interface and Protocol (NFCIP-1). http:\/\/www.iso.org\/iso\/catalogue_detail.htm?csnumber=38578"},{"key":"436_CR15","doi-asserted-by":"crossref","unstructured":"Massouda N, Saundersb A, Scholnickc B (2010) The cost of being late? The case of credit card penalty fees. J Financ Stability. doi: 10.1016\/j.jfs.2009.12.001","DOI":"10.1016\/j.jfs.2009.12.001"},{"key":"436_CR16","unstructured":"MasterCard Worldwide, Tap & Go with MasterCard PayPass. http:\/\/www.paypass.com\/"},{"key":"436_CR17","unstructured":"MasterCard Worldwide, MasterCard Pioneers Innovation in Payments with NFC Enabled Mobile Phones. http:\/\/www.mastercard.com\/hk\/personal\/en\/wce\/pdf\/19755_Microsoft_Word_-_0411_-_HK-_NFC_release_-_Eng_-FINAL.pdf"},{"key":"436_CR18","unstructured":"Michael K, Burrows JH ELECTRONIC DATA INTERCHANGE (EDI). National Institute of Standards and Technology, 1996\/04\/29. http:\/\/www.itl.nist.gov\/fipspubs\/fip161-2.htm"},{"key":"436_CR19","unstructured":"National Institute of Standards and Technology (NIST) (2009) Digital Signature Standard (DSS), The Federal Information Processing Standards (FIPS) Publication 186\u20133. http:\/\/csrc.nist.gov\/publications\/fips\/fips186-3\/fips_186-3.pdf"},{"key":"436_CR20","unstructured":"NFC Forum website. http:\/\/www.nfc-forum.org\/home"},{"key":"436_CR21","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/S1754-4548(09)70085-3","volume":"6-4","author":"S Pritchard","year":"2009","unstructured":"Pritchard S (2009) Data lost, not found. Infosecurity 6-4:22\u201324","journal-title":"Infosecurity"},{"key":"436_CR22","doi-asserted-by":"crossref","first-page":"918","DOI":"10.1016\/j.jmoneco.2009.09.003","volume":"56-7","author":"W Roberds","year":"2009","unstructured":"Roberds W, Schreft SL (2009) Data breaches and identity theft. J Monetary Econ 56-7:918\u2013929","journal-title":"J Monetary Econ"},{"key":"436_CR23","doi-asserted-by":"crossref","unstructured":"Schuhy S, Shyz O, Stavins J (2010) Who gains and who loses from credit card payments? Theory and calibrations. The Economics of Payments IV\u2014Federal Reserve Bank of New York. http:\/\/newyorkfed.org\/research\/conference\/2010\/econ\/reward28.pdf","DOI":"10.2139\/ssrn.1652260"},{"key":"436_CR24","unstructured":"Sweeney II PJ (2005) RFID for dummies. Wiley, ISBN: 0-7645-7910-X"},{"key":"436_CR25","unstructured":"VeriSign, The EPCglobal Network: Enhancing the supply chain. White Paper (2005). http:\/\/www.verisign.com\/static\/DEV044095.pdf"},{"key":"436_CR26","unstructured":"Vijayan J (2009) Heartland data breach sparks security concerns in payment industry. News article at Computerworld, http:\/\/www.computerworld.com\/s\/article\/9126608\/Heartland_data_breach_sparks_security_concerns_in_payment_industry"},{"key":"436_CR27","unstructured":"Visa USA, VISA PAYWAVE. http:\/\/usa.visa.com\/personal\/cards\/paywave\/index.html"},{"key":"436_CR28","unstructured":"Visa Europe, Visa Contactless\u2014the wave and pay alternative to cash for low value transactions. http:\/\/www.visaeurope.com\/pressandmedia\/factsheets\/visacontactless.jsp"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-011-0436-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-011-0436-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-011-0436-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T20:56:01Z","timestamp":1560459361000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-011-0436-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8,7]]},"references-count":28,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2012,8]]}},"alternative-id":["436"],"URL":"https:\/\/doi.org\/10.1007\/s00779-011-0436-7","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,8,7]]}}}