{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:28:23Z","timestamp":1759091303742},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,3,11]],"date-time":"2014-03-11T00:00:00Z","timestamp":1394496000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1007\/s11277-014-1680-8","type":"journal-article","created":{"date-parts":[[2014,3,10]],"date-time":"2014-03-10T16:39:53Z","timestamp":1394469593000},"page":"2981-2996","source":"Crossref","is-referenced-by-count":13,"title":["A Secure and Efficient Authentication Scheme for E-coupon Systems"],"prefix":"10.1007","volume":"77","author":[{"given":"Ching-Chun","family":"Chang","sequence":"first","affiliation":[]},{"given":"Chin-Yu","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,11]]},"reference":[{"issue":"11\u201316","key":"1680_CR1","first-page":"1101","volume":"31","author":"M Jakobsson","year":"1999","unstructured":"Jakobsson, M., Mackenzie, P. D., & Stern, J. P. (1999). Secure and lightweight advertising on the web. Journal of Computer and Telecommunications Networking, 31(11\u201316), 1101\u20131109.","journal-title":"Journal of Computer and Telecommunications Networking"},{"key":"1680_CR2","unstructured":"Anand, R., Kumar, M., & Jhingran, A. (1999). Distributing E-coupon on the Internet. In Proceedings of 9th Annual Conference of the Internet Society, California, U.S.A."},{"key":"1680_CR3","unstructured":"Garg, R., Mittal, P., Agarwal, V., & Modani, N. (2001). An architecture for secure generation and verification of electronic coupons. In Proceedings of the General Track: 2002 USENIX Annual Technical Conference (pp. 51\u201363). California, U.S.A."},{"key":"1680_CR4","doi-asserted-by":"crossref","unstructured":"Cimato, S., & Bonis, A. D. (2001). Online advertising: Secure E-coupons. In Proceedings of 7th Italian Conference on Theoretical Computer Science (pp. 370\u2013383). Torino, Italy.","DOI":"10.1007\/3-540-45446-2_24"},{"key":"1680_CR5","doi-asserted-by":"crossref","unstructured":"Blundo, C., Cimato, S., & Bonis, A. D. (2002). A lightweight protocol for the generation and distribution of secure e-coupons. In Proceedings of 11th international conference on World Wide Web (pp. 542\u2013552). New York, U.S.A.","DOI":"10.1145\/511446.511517"},{"key":"1680_CR6","first-page":"1086","volume":"1","author":"T Shojima","year":"2004","unstructured":"Shojima, T., Ikkai, Y., & Komoda, N. (2004). A method for mediator identification using queued history of encrypted user information in an incentive attached peer to peer electronic coupon system. Proceedings of IEEE International Conference on Systems, Man and Cybernetics, 1, 1086\u20131091.","journal-title":"Proceedings of IEEE International Conference on Systems, Man and Cybernetics"},{"key":"1680_CR7","unstructured":"Juniper Research, Mobile Coupons, 2008 Internet Resource, http:\/\/www.juniperresearch . (Date of access: July 2013)."},{"issue":"4","key":"1680_CR8","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.elerap.2010.01.002","volume":"9","author":"SC Hsueh","year":"2010","unstructured":"Hsueh, S. C., & Chen, J. M. (2010). Sharing secure m-coupons for peer-generated targeting via eWOM communications. Electronic Commerce Research and Applications, 9(4), 283\u2013293.","journal-title":"Electronic Commerce Research and Applications"},{"issue":"1","key":"1680_CR9","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1002\/dir.10073","volume":"18","author":"HT Thorsten","year":"2004","unstructured":"Thorsten, H. T., Gwinner, K. P., Walsh, G., & Gremler, D. D. (2004). Electronic word-of-mouth via consumer-opinion platforms: What motivates consumers to articulate themselves on the Internet? Journal of Interactive Marketing, 18(1), 38\u201352.","journal-title":"Journal of Interactive Marketing"},{"issue":"4","key":"1680_CR10","doi-asserted-by":"crossref","first-page":"1327","DOI":"10.1016\/j.chaos.2004.06.069","volume":"23","author":"D Xiao","year":"2005","unstructured":"Xiao, D., Liaoa, X., & Wong, K. W. (2005). An efficient entire chaos-based scheme for deniable authentication. Chaos, Solitons and Fractals, 23(4), 1327\u20131331.","journal-title":"Chaos, Solitons and Fractals"},{"issue":"2","key":"1680_CR11","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120\u2013126.","journal-title":"Communications of the ACM"},{"key":"1680_CR12","unstructured":"Wikipedia, Wikipedia\u2014The Free Encyclopedia, 2013 Internet Resource, https:\/\/en.wikipedia.org\/wiki\/Smart_card . (Date of access: July 2013)."},{"key":"1680_CR13","doi-asserted-by":"crossref","unstructured":"Chang, C. C., Cheng, T. F., & Wu, H. L. (2012). An authentication and key agreement scheme for satellite communications. International Journal of Communication Systems, First published. doi: 10.1002\/dac.2448 .","DOI":"10.1002\/dac.2448"},{"issue":"1\u20132","key":"1680_CR14","first-page":"35","volume":"55","author":"CT Li","year":"2012","unstructured":"Li, C. T., & Lee, C. C. (2012). A novel user authentication and privacy preserving scheme with smartcards for wireless communications. Mathematical and Computer Modelling, 55(1\u20132), 35\u201344.","journal-title":"Mathematical and Computer Modelling"},{"issue":"3","key":"1680_CR15","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/j.comcom.2010.02.031","volume":"34","author":"D He","year":"2011","unstructured":"He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367\u2013374.","journal-title":"Computer Communications"},{"issue":"6","key":"1680_CR16","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"1680_CR17","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1002\/sat.1033","volume":"31","author":"CC Lee","year":"2013","unstructured":"Lee, C. C. (2013). A simple key agreement scheme based on chaotic maps for VSAT satellite communications. International Journal of Satellite Communications and Networking, 31(4), 177\u2013186.","journal-title":"International Journal of Satellite Communications and Networking"},{"key":"1680_CR18","volume-title":"Applied cryptography, protocols, algorithms, and source code in C","author":"B Schneier","year":"1996","unstructured":"Schneier, B. (1996). Applied cryptography, protocols, algorithms, and source code in C (2nd ed.). New York, USA: Wiley.","edition":"2"},{"key":"1680_CR19","unstructured":"Aigner, M., Dominikus, S., & Feldhofer, M. (2007). A system of secure virtial coupons using NFC technology. In Proceedings of IEEE International Conference on Pervasive Computing and Communication Workshops (pp. 362\u2013366). New York, U.S.A."},{"key":"1680_CR20","doi-asserted-by":"crossref","unstructured":"Dominikus, S., & Aigner, M. (2007). mCoupons: An application for near field communication (NFC). In Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops (pp. 421\u2013428), Ontario, Canada.","DOI":"10.1109\/AINAW.2007.230"},{"key":"1680_CR21","unstructured":"Hsiang, H. C., & Shih, W. K. (2008). Secure mCoupons scheme using NFC. Seoul, Korea: Proceedings of the International Conference on Business and Information."},{"issue":"5","key":"1680_CR22","doi-asserted-by":"crossref","first-page":"131","DOI":"10.14257\/ijsia.2013.7.5.11","volume":"7","author":"SW Park","year":"2013","unstructured":"Park, S. W., & Lee, I. Y. (2013). Efficient mCoupon authentication scheme for smart poster environments based on low-cost NFC. International Journal of Security and its Applications, 7(5), 131\u2013138.","journal-title":"International Journal of Security and its Applications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-014-1680-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-014-1680-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-014-1680-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T05:13:36Z","timestamp":1565241216000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-014-1680-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,11]]},"references-count":22,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["1680"],"URL":"https:\/\/doi.org\/10.1007\/s11277-014-1680-8","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3,11]]}}}