{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T15:32:30Z","timestamp":1757777550506,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750161","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T15:20:46Z","timestamp":1395933646000},"page":"52-58","source":"Crossref","is-referenced-by-count":4,"title":["Formally defining NFC M-coupon requirements, with a case study"],"prefix":"10.1109","author":[{"given":"Ali","family":"Alshehri","sequence":"first","affiliation":[]},{"given":"Steve","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"87","article-title":"A new lightweight hybrid cryptographic algorithm for the internet of things","author":"shemaili","year":"2012","journal-title":"Internet Technology and Secured Transactions 2012 International Conferece for"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/NFC.2013.6482439"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2009.5402511"},{"journal-title":"Communicating Sequential Processes","year":"1985","author":"hoare","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(95)00144-2"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596779"},{"journal-title":"Juniper Research","article-title":"Mobile coupons-ecosystem analysis and marketing channel strategy 2011-2016","year":"2011","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1002\/9780470665121"},{"journal-title":"Information Technology-Telecommunications and Information Exchange between Systems-Near Field Communication-Interface and Protocol (NFCIP-1)","year":"2004","key":"1"},{"key":"10","first-page":"3901","article-title":"A sECURE mCOUPON sCHEME uSING nEAR fIELD cOMMUNICATION","volume":"5","author":"hsiang","year":"2009","journal-title":"International Journal of Innovative Computing Information and Control"},{"journal-title":"Disney Battles Coupon Goof","year":"2002","author":"wolverton","key":"7"},{"journal-title":"The Future Is NFC Says Coupons Com Exec","year":"2011","author":"brown","key":"6"},{"journal-title":"Smart Card Alliance","article-title":"Proximity mobile payments business scenarios research report on stakeholder perspective","year":"2008","key":"5"},{"journal-title":"Survey Discounts and Coupons Will Drive Adoption of Mobile Payments","year":"2011","author":"clark","key":"4"},{"key":"9","article-title":"Secure mcoupons scheme using nfc","author":"hsiang","year":"2008","journal-title":"International Conference on Business and Information"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/AINAW.2007.230"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750161.pdf?arnumber=6750161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:42:32Z","timestamp":1490308952000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750161\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750161","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}