{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:55Z","timestamp":1750306795447,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,17]],"date-time":"2012-08-17T00:00:00Z","timestamp":1345161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,17]]},"DOI":"10.1145\/2490428.2490432","type":"proceedings-article","created":{"date-parts":[[2013,6,5]],"date-time":"2013-06-05T12:10:07Z","timestamp":1370434207000},"page":"27-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A secure and optimized mobile payment framework with formal verification"],"prefix":"10.1145","author":[{"given":"Shaik Shakeel","family":"Ahamad","sequence":"first","affiliation":[{"name":"University of Hyderabad, Gachibowli, Hyderabad"}]},{"given":"V. N.","family":"Sastry","sequence":"additional","affiliation":[{"name":"IDRBT, Castle Hills, Masab Tank, Hyderabad"}]},{"given":"Siba K.","family":"Udgata","sequence":"additional","affiliation":[{"name":"DCIS, University of Hyderabad, Gachibowli, Hyderabad"}]}],"member":"320","published-online":{"date-parts":[[2012,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17878-8_42"},{"volume-title":"Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04)","author":"Supakorn","key":"e_1_3_2_1_2_1","unstructured":"Supakorn Kungpisdan1, Bala Srinivasan2, and Phu Dung Le , \" A Secure Account-Based Mobile Payment Protocol\" Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) 0-7695-2108-8\/04. Supakorn Kungpisdan1, Bala Srinivasan2, and Phu Dung Le, \"A Secure Account-Based Mobile Payment Protocol\" Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) 0-7695-2108-8\/04."},{"volume-title":"Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04)","author":"Kungpisdan Supakorn","key":"e_1_3_2_1_3_1","unstructured":"Supakorn Kungpisdan , Bala Srinivasan , and Phu Dung Le , \" Accountability Logic for Mobile Payment Protocols\" Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) . Supakorn Kungpisdan, Bala Srinivasan, and Phu Dung Le, \"Accountability Logic for Mobile Payment Protocols\" Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04)."},{"key":"e_1_3_2_1_4_1","unstructured":"Supakorn Kungpisdan \"Formal Modeling of Practical and Secure Mobile Payment Systems\"  Supakorn Kungpisdan \"Formal Modeling of Practical and Secure Mobile Payment Systems\""},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITA.2005.122"},{"key":"e_1_3_2_1_6_1","unstructured":"Gianluigi Me Alex Schuster \"A mobile local payment system Bluetooth based\" International Symposium on Wireless Communications (ISWSN'05) 2005.  Gianluigi Me Alex Schuster \"A mobile local payment system Bluetooth based\" International Symposium on Wireless Communications (ISWSN'05) 2005."},{"key":"e_1_3_2_1_7_1","volume-title":"proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW","author":"Susilo Chris","year":"2006","unstructured":"Buyya, Rajkumar; Ma, Tianchi; Safavi-Naini, Reihaneh; Steketee, Chris and Susilo , Willy, \" Formal analysis of card-based payment systems in mobile devices\" ACSW frontiers 2006 : proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006 ), Hobart , Tasmania, Australia , 16--19 January 2006, p.213--220. Buyya, Rajkumar; Ma, Tianchi; Safavi-Naini, Reihaneh; Steketee, Chris and Susilo, Willy, \"Formal analysis of card-based payment systems in mobile devices\" ACSW frontiers 2006: proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, 16--19 January 2006, p.213--220."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJITST.2012.045153"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1185448.1185594"},{"key":"e_1_3_2_1_10_1","volume-title":"Principles and Practices","author":"Stallings W.","year":"1873","unstructured":"W. Stallings , \" Cryptography and Network Security : Principles and Practices ,\" 4 th Edition, Pearson Education, ISBN-10: 013 1873 164 ISBN- 13: 9780131873162, 2006. W. Stallings, \"Cryptography and Network Security: Principles and Practices,\" 4th Edition, Pearson Education, ISBN-10: 0131873164 ISBN-13: 9780131873162, 2006.","edition":"4"},{"key":"e_1_3_2_1_11_1","volume-title":"Eindhoven University of Technology","author":"Cremers C. J. F.","year":"2006","unstructured":"C. J. F. Cremers , \" Scyther-Semantics and Verification of Security Protocols ,\" Ph.D. Thesis , Eindhoven University of Technology , 2006 C. J. F. Cremers, \"Scyther-Semantics and Verification of Security Protocols,\" Ph.D. Thesis, Eindhoven University of Technology, 2006"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_27"},{"key":"e_1_3_2_1_13_1","first-page":"295","volume-title":"INDOCRYPT","author":"Kungpisdan Supakorn","year":"2003","unstructured":"Supakorn Kungpisdan , Bala Srinivasan , and Phu Dung Le , \" Lightweight Mobile Credit-Card Payment Protocol\" , INDOCRYPT 2003 , LNCS 2904, pp. 295 -- 308 . Supakorn Kungpisdan, Bala Srinivasan, and Phu Dung Le, \"Lightweight Mobile Credit-Card Payment Protocol\", INDOCRYPT 2003, LNCS 2904, pp. 295--308."},{"key":"e_1_3_2_1_14_1","volume-title":"D. R. Stinson, \"Cryptography-Theory and Practice,\"","year":"2006","unstructured":"D. R. Stinson, \"Cryptography-Theory and Practice,\" 3 rd edition, Chapman & Hall\/CRC , 2006 . D. R. Stinson, \"Cryptography-Theory and Practice,\" 3rd edition, Chapman & Hall\/CRC, 2006.","edition":"3"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2004.5342298"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACRIM.2009.5291393"}],"event":{"name":"SECURIT '12: First International Conference on Security of Internet of Things","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","TCG Trusted Computing Group","Amrita Amrita Vishwa Vidyapeetham","CSA Computer Science Association"],"location":"Kollam India","acronym":"SECURIT '12"},"container-title":["Proceedings of the First International Conference on Security of Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490432","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2490428.2490432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:35Z","timestamp":1750232075000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490432"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,17]]},"references-count":16,"alternative-id":["10.1145\/2490428.2490432","10.1145\/2490428"],"URL":"https:\/\/doi.org\/10.1145\/2490428.2490432","relation":{},"subject":[],"published":{"date-parts":[[2012,8,17]]},"assertion":[{"value":"2012-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}