{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T20:00:16Z","timestamp":1746388816601},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/cts.2012.6261085","type":"proceedings-article","created":{"date-parts":[[2012,8,8]],"date-time":"2012-08-08T17:09:50Z","timestamp":1344445790000},"source":"Crossref","is-referenced-by-count":5,"title":["A mobile payment evaluation based on a digital identity representation"],"prefix":"10.1109","author":[{"given":"Johann","family":"Vincent","sequence":"first","affiliation":[]},{"given":"Vincent","family":"Alimi","sequence":"additional","affiliation":[]},{"given":"Aude","family":"Plateaux","sequence":"additional","affiliation":[]},{"given":"Chrystel","family":"Gaber","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Pasquet","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(93)90021-G"},{"key":"22","author":"vincent","year":"2010","journal-title":"Cartography of Actors and Roles in Identity Management Solutions"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69861-6_15"},{"key":"18","first-page":"477","article-title":"Proposal for a common identity framework: A user-centric identity metasystem","author":"cameron","year":"2009","journal-title":"Identity in the Information Society Challenges and Opportunities"},{"key":"15","article-title":"User centric identity management","author":"j\ufffdsang","year":"2005","journal-title":"AusCERT Asia Pacific Information Technology Security Conference"},{"key":"16","first-page":"16","author":"recordon","year":"2006","journal-title":"Openid 2 0 A Platform for User-centric Identity Management"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2007.03.002"},{"key":"14","article-title":"FIDIS deliverable D3. 1- structured overview on prototypes and concepts of identity management systems","author":"bauer","year":"2005","journal-title":"Frankfurt AM"},{"key":"11","author":"stamatis karnouskos","year":"0","journal-title":"Ave Security Trust and Privacy in the Secure Mobile Payment Service"},{"key":"12","author":"cameron","year":"0","journal-title":"The Laws of identity"},{"key":"21","author":"deng","year":"2010","journal-title":"Privacy Preserving Content Protection"},{"key":"3","article-title":"The payment system: Payments, securities, derivatives and the role of the eurosystem","year":"2010","journal-title":"Eur Central Bank"},{"key":"20","author":"howard","year":"2006","journal-title":"The Security Development Lifecycle"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2007.02.001"},{"key":"1","author":"wilcox","year":"0","journal-title":"Mobile Payments Market to Quadruple by 2014"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/967900.968218"},{"key":"7","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/3-540-45598-1_10","article-title":"Mobile Payments - State of the Art and Open Problems","author":"wrona","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"6","year":"0","journal-title":"Chip Authentication Program"},{"key":"5","year":"0","journal-title":"Set Secure Electronic Transaction Specification Book One Business Description Version 1 0"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICMB.2008.30"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.78"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/S0965-2590(06)70565-5"}],"event":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","location":"Denver, CO, USA","start":{"date-parts":[[2012,5,21]]},"end":{"date-parts":[[2012,5,25]]}},"container-title":["2012 International Conference on Collaboration Technologies and Systems (CTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6247135\/6261004\/06261085.pdf?arnumber=6261085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T22:37:03Z","timestamp":1497998223000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6261085\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/cts.2012.6261085","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}