{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:05:14Z","timestamp":1725797114602},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/icin.2013.6670900","type":"proceedings-article","created":{"date-parts":[[2013,12,3]],"date-time":"2013-12-03T17:00:05Z","timestamp":1386090005000},"page":"102-109","source":"Crossref","is-referenced-by-count":3,"title":["Wallet-on-wheels &amp;#x2014; Using vehicle's identity for secure mobile money"],"prefix":"10.1109","author":[{"given":"Rebecca","family":"Coneland","sequence":"first","affiliation":[]},{"given":"Noel","family":"Crespi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2009.65"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob.2008.9"},{"key":"18","article-title":"Achieving efcient cooperative message authentication in vehicular ad hoc networks","author":"lin","year":"2013","journal-title":"IEEE"},{"year":"0","key":"33"},{"journal-title":"Feasibility Study on the Security Aspects of Remote Provisioning and Change of Subscription for Machine to Machine (M2M) Equipment\" (Release 9) 2010-06","year":"0","key":"15"},{"journal-title":"BMW Uses NFC Car Keys to Open Hotel Room Doors","year":"0","author":"clarck","key":"16"},{"key":"13","article-title":"A real-time planning-based scheduling policy with can for automotive communication systems","author":"cao","year":"2008","journal-title":"IEEE"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ITST.2011.6060061"},{"journal-title":"Machine-to-Machine Communications Connecting Billions of Devices","year":"2012","key":"11"},{"key":"12","article-title":"M2M remote-subscription management","author":"barria","year":"2011","journal-title":"Ericsson Rev"},{"year":"2011","key":"21"},{"journal-title":"Visa Europe Backs Mobile Money Network","year":"0","key":"20"},{"year":"0","key":"22"},{"year":"0","key":"23"},{"journal-title":"Decline in Fraud Losses Stalled by Rise in Deception Crimes Aimed at Consumers","year":"2013","key":"24"},{"year":"2013","key":"25"},{"journal-title":"TIME Magazine","article-title":"Law enforcement sounds alarm on cell-phone-theft epidemic","year":"2013","key":"26"},{"year":"0","key":"27"},{"journal-title":"BMW Owners Offered Fix for Hi-tech Theft","year":"0","key":"28"},{"journal-title":"EU Adopts Automobile Emergency Calling Service ECall","year":"2011","key":"29"},{"journal-title":"The BMW NFC Key","year":"2011","author":"kratz","key":"3"},{"key":"2","article-title":"Mobile money roadmap for latin america","author":"jimenez","year":"2011","journal-title":"IBM Connect-World la"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2012.6376034"},{"key":"1","article-title":"A new approach to mobile security: Protection on every side","author":"severino","year":"2011","journal-title":"Symantec Connect World la"},{"journal-title":"Electronic Car Key Fobs Fail","year":"2011","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5458377"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICNS.2009.54"},{"journal-title":"Intelligent Transport Systems (ITS)-Vehicular Communications Basic Set of Applications Part 1 Functional Requirements","year":"2010","key":"32"},{"key":"5","article-title":"Different wireless technologies for the remotepayment of street car parks","author":"benelli","year":"2012","journal-title":"IEEE"},{"journal-title":"3GPP System Architecture Evolution (SAE) Security Aspects of non-3GPP Accesses (Release 11)","year":"2006","key":"31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/NFC.2010.11"},{"journal-title":"IEEE","article-title":"Morphing smartphones into automotive application platforms","year":"2012","key":"9"},{"journal-title":"Consumers and Mobile Financial Services March","year":"0","key":"8"}],"event":{"name":"2013 17th International Conference on Intelligence in Next Generation Networks (ICIN): Unlocking Value from the Networks","start":{"date-parts":[[2013,10,15]]},"location":"Venice, Italy","end":{"date-parts":[[2013,10,16]]}},"container-title":["2013 17th International Conference on Intelligence in Next Generation Networks (ICIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6657102\/6670883\/06670900.pdf?arnumber=6670900","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T20:18:24Z","timestamp":1490213904000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6670900\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icin.2013.6670900","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}