{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:35:54Z","timestamp":1729665354926,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1109\/icoin.2015.7057856","type":"proceedings-article","created":{"date-parts":[[2015,3,13]],"date-time":"2015-03-13T16:58:20Z","timestamp":1426265900000},"page":"51-56","source":"Crossref","is-referenced-by-count":2,"title":["User authentication using mobile phones for mobile payment"],"prefix":"10.1109","author":[{"family":"Soonhwa Sung","sequence":"first","affiliation":[]},{"family":"Cheong Youn","sequence":"additional","affiliation":[]},{"family":"Eunbae Kong","sequence":"additional","affiliation":[]},{"family":"Jaecheol Ryou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Improvement of the More Efficient and Secure ID-based Remote Mutual Authentication With Key Agreement Scheme for Mobile Devices on ECC","volume":"3","author":"toan-thinh","year":"2012","journal-title":"An International Journal of Future Technology Research Association International (FTRA)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/070414"},{"article-title":"User Authentication on Mobile Devices","year":"2012","author":"sethi","key":"ref12"},{"key":"ref13","first-page":"106","article-title":"An Effective Two Factor Authentication Method Using QR Code","volume":"21","author":"soonduck","year":"2013","journal-title":"ASTL"},{"article-title":"A Two-Factor Authentication Mechanism Using Mobile Phones","year":"2008","author":"nima","key":"ref14"},{"key":"ref15","article-title":"tiqr: A Novel Take on Two-factor Authentication","author":"van","year":"2011","journal-title":"Proceedings of the 25th International Conference on Large Installation System Administration USENIX Association"},{"key":"ref16","article-title":"The Decline and Dawn of Two-Factor Authentication on Smart Phones","author":"tomas","year":"2012","journal-title":"Information Security Summit"},{"key":"ref17","article-title":"Software Tokens Based Two Factor Authentication Scheme","volume":"2","author":"manav","year":"2012","journal-title":"International Journal of Information and Electronics Engineering"},{"key":"ref18","first-page":"321","article-title":"Lightweight Mobile Credit-Card Payment Protocol","author":"kungpisdan","year":"2003","journal-title":"Berlin Heidelberg Springer-Verlag"},{"key":"ref19","first-page":"422","article-title":"Anonymous Payment in a Client Centric Model for Digital Ecosystem","author":"tellez","year":"2007","journal-title":"IEEE DEST"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0895-7177(02)00106-1"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2003.1209534"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NWESP.2005.67"},{"key":"ref5","first-page":"46","article-title":"Flexible Remote User Authentication Scheme Using Smart Cards","volume":"36","author":"cheng-chi","year":"2002","journal-title":"IEEE Transactions on Neural Network"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1016\/j.comcom.2008.11.008","article-title":"A More Efficient and Secure Dynamic ID-based Remote User Authentication Scheme","volume":"32","author":"yan-yan","year":"2009","journal-title":"Computer Communications"},{"key":"ref7","first-page":"499","article-title":"Improving the Dynamic ID-based Remote Mutual Authentication Scheme","volume":"4277","author":"yoon","year":"2006","journal-title":"Information Security First International Workshop"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/72.963786"},{"key":"ref1","article-title":"Software Tokens Based Two Factor Authentication Scheme","volume":"2","author":"manav","year":"2012","journal-title":"International Journal of Information and Electronics Engineering"},{"key":"ref9","first-page":"13863","article-title":"A Secure Dynamic ID based Remote User Authentication Scheme for Multiserver Environment Using Smart Cards","volume":"38","author":"lee","year":"2011","journal-title":"Expert Systems with Applications"},{"key":"ref20","first-page":"162","article-title":"A Lightweight and Private Mobile Payment Protocol by Using Mobile Network Operator","author":"fun","year":"2008","journal-title":"The International Conference on Computer and Communication Engineering"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2012.06.097"}],"event":{"name":"2015 International Conference on Information Networking (ICOIN)","start":{"date-parts":[[2015,1,12]]},"location":"Cambodia","end":{"date-parts":[[2015,1,14]]}},"container-title":["2015 International Conference on Information Networking (ICOIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7051394\/7057846\/07057856.pdf?arnumber=7057856","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T03:19:50Z","timestamp":1498187990000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7057856\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icoin.2015.7057856","relation":{},"subject":[],"published":{"date-parts":[[2015,1]]}}}