{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T10:43:30Z","timestamp":1761561810765,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,4]],"date-time":"2013-11-04T00:00:00Z","timestamp":1383523200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,4]]},"DOI":"10.1145\/2517840.2517848","type":"proceedings-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T15:29:36Z","timestamp":1384270176000},"page":"143-154","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Privacy-preserving billing for e-ticketing systems in public transportation"],"prefix":"10.1145","author":[{"given":"Florian","family":"Kerschbaum","sequence":"first","affiliation":[{"name":"SAP, Karlsruhe, Germany"}]},{"given":"Hoon Wei","family":"Lim","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Ivan","family":"Gudymenko","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Dresden, Dresden, Germany"}]}],"member":"320","published-online":{"date-parts":[[2013,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Advanced Card Systems. ACR122U USB NFC reader. http:\/\/nfc-reader.com\/pages\/contactless-readers\/documents.  Advanced Card Systems. ACR122U USB NFC reader. http:\/\/nfc-reader.com\/pages\/contactless-readers\/documents."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1391239"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11533733_16"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 12th Network and Distributed System Security Symposium (NDSS)","author":"Ateniese G.","year":"2005","unstructured":"G. Ateniese , K. Fu , M. Green , and S. Hohenberger . Improved proxy re-encryption schemes with applications to secure distributed storage . In Proceedings of the 12th Network and Distributed System Security Symposium (NDSS) , 2005 . G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. In Proceedings of the 12th Network and Distributed System Security Symposium (NDSS), 2005."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102161"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03770-2_9"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 19th USENIX Security Symposium","author":"Balasch J.","year":"2010","unstructured":"J. Balasch , A. Rial , C. Troncoso , B. Preneel , I. Verbauwhede , and C. Geuens . PrETP: privacy-preserving electronic toll pricing . In Proceedings of the 19th USENIX Security Symposium , 2010 . J. Balasch, A. Rial, C. Troncoso, B. Preneel, I. Verbauwhede, and C. Geuens. PrETP: privacy-preserving electronic toll pricing. In Proceedings of the 19th USENIX Security Symposium, 2010."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12510-2_15"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368351"},{"key":"e_1_3_2_1_11_1","unstructured":"Calypso Networks Association. What's Calypso? http:\/\/www.calypsonet-asso.org\/index.php?rubrique=main_10.  Calypso Networks Association. What's Calypso? http:\/\/www.calypsonet-asso.org\/index.php?rubrique=main_10."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_27"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/647086.715698"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/646767.704437"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_4"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/647086.715687"},{"key":"e_1_3_2_1_17_1","unstructured":"S. Clark. DBS StarHub and EZ-Link to begin Singapore NFC pilot in December. http:\/\/www.nfcworld.com\/2010\/11\/29\/35271\/dbs-starhub-and-ez-link-to-begin-singapore-nfc-pilot-in-december\/  S. Clark. DBS StarHub and EZ-Link to begin Singapore NFC pilot in December. http:\/\/www.nfcworld.com\/2010\/11\/29\/35271\/dbs-starhub-and-ez-link-to-begin-singapore-nfc-pilot-in-december\/"},{"key":"e_1_3_2_1_18_1","volume-title":"Black Hat USA Technical Conference","author":"Dabirsiaghi A.","year":"2010","unstructured":"A. Dabirsiaghi . JavaSnoop : How to hack anything written in JavaSnoop . Black Hat USA Technical Conference , 2010 . A. Dabirsiaghi. JavaSnoop: How to hack anything written in JavaSnoop. Black Hat USA Technical Conference, 2010."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography (PKC)","author":"Damg\u00e5rd I.","year":"2001","unstructured":"I. Damg\u00e5rd , and M. Jurik . A generalisation, a simplification and some applications of Paillier's probabilistic public-key system . In Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography (PKC) , 2001 . I. Damg\u00e5rd, and M. Jurik. A generalisation, a simplification and some applications of Paillier's probabilistic public-key system. In Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography (PKC), 2001."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI)","author":"Dean J.","year":"2004","unstructured":"J. Dean and S. Ghemawat . MapReduce: Simplified data processing on large clusters . In Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI) , 2004 . J. Dean and S. Ghemawat. MapReduce: Simplified data processing on large clusters. In Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI), 2004."},{"key":"e_1_3_2_1_22_1","unstructured":"Eclipse IDE for Java EE Developers. http:\/\/www.eclipse.org\/  Eclipse IDE for Java EE Developers. http:\/\/www.eclipse.org\/"},{"key":"e_1_3_2_1_23_1","unstructured":"EZ-Link. EZ-Link Card System and Technology. http:\/\/www.ezlink.com.sg\/business\/sys-tech.php.  EZ-Link. EZ-Link Card System and Technology. http:\/\/www.ezlink.com.sg\/business\/sys-tech.php."},{"key":"e_1_3_2_1_24_1","unstructured":"EZ-Link. EZ-Link FAQs. http:\/\/www.ezlink.com.sg\/services\/faqs\/ez-link-faqs.php.  EZ-Link. EZ-Link FAQs. http:\/\/www.ezlink.com.sg\/services\/faqs\/ez-link-faqs.php."},{"key":"e_1_3_2_1_25_1","unstructured":"EZ-Link. EZ-Online and Top & Tap FAQs. http:\/\/www.ezlink.com.sg\/services\/faqs\/ez-online-faqs.php.  EZ-Link. EZ-Online and Top & Tap FAQs. http:\/\/www.ezlink.com.sg\/services\/faqs\/ez-online-faqs.php."},{"key":"e_1_3_2_1_26_1","unstructured":"EZ-Link. Key Statistics. http:\/\/www.ezlink.com.sg\/corporate\/keystats.php.  EZ-Link. Key Statistics. http:\/\/www.ezlink.com.sg\/corporate\/keystats.php."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511721656","volume-title":"Foundations of Cryptography","author":"Goldreich O.","year":"2004","unstructured":"O. Goldreich . Foundations of Cryptography : Volume 2 -- Basic Applications. Cambridge University Press , 2004 . O. Goldreich. Foundations of Cryptography: Volume 2 -- Basic Applications. Cambridge University Press, 2004."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1785594.1785598"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12368-9_10"},{"key":"e_1_3_2_1_32_1","unstructured":"Land Transport Authority. Electronic Road Pricing. http:\/\/www.lta.gov.sg\/content\/lta\/en\/motoring\/erp_.html.  Land Transport Authority. Electronic Road Pricing. http:\/\/www.lta.gov.sg\/content\/lta\/en\/motoring\/erp_.html."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0019-2"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_23"},{"key":"e_1_3_2_1_35_1","unstructured":"K. Liu. Java Code for Paillier's Cryptosystem 2006. http:\/\/www.csee.umbc.edu\/ kunliu1\/research\/Paillier.html  K. Liu. Java Code for Paillier's Cryptosystem 2006. http:\/\/www.csee.umbc.edu\/ kunliu1\/research\/Paillier.html"},{"key":"e_1_3_2_1_36_1","volume-title":"Black Hat DC","author":"Marlinspike M.","year":"2009","unstructured":"M. Marlinspike . New tricks for defeating SSL in practice . Black Hat DC , 2009 . M. Marlinspike. New tricks for defeating SSL in practice. Black Hat DC, 2009."},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 20th USENIX Security Symposium","author":"Meiklejohn S.","year":"2011","unstructured":"S. Meiklejohn , K. Mowery , S. Checkoway , and H. Shacham . The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion . In Proceedings of the 20th USENIX Security Symposium , 2011 . S. Meiklejohn, K. Mowery, S. Checkoway, and H. Shacham. The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion. In Proceedings of the 20th USENIX Security Symposium, 2011."},{"key":"e_1_3_2_1_38_1","unstructured":"Octopus. Octopus Technology. http:\/\/www.octopus.com.hk\/octopus-for-businesses\/octopus-technology\/en\/index.html.  Octopus. Octopus Technology. http:\/\/www.octopus.com.hk\/octopus-for-businesses\/octopus-technology\/en\/index.html."},{"key":"e_1_3_2_1_39_1","unstructured":"Octopus. Top Up with AAVS. http:\/\/www.octopus.com.hk\/easy-reloading\/top-up-with-aavs\/en\/index.html.  Octopus. Top Up with AAVS. http:\/\/www.octopus.com.hk\/easy-reloading\/top-up-with-aavs\/en\/index.html."},{"key":"e_1_3_2_1_40_1","unstructured":"Oracle Corporation. The Java Development Kit 7. http:\/\/www.oracle.com\/technetwork\/java\/javase\/downloads\/index.html.  Oracle Corporation. The Java Development Kit 7. http:\/\/www.oracle.com\/technetwork\/java\/javase\/downloads\/index.html."},{"key":"e_1_3_2_1_41_1","volume-title":"Advances in Cryptology (EUROCRYPT)","author":"Paillier P.","year":"1999","unstructured":"P. Paillier . Public-Key Cryptosystems Based on Composite Degree Residuosity Classes . In Advances in Cryptology (EUROCRYPT) , 1999 . P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology (EUROCRYPT), 1999."},{"key":"e_1_3_2_1_42_1","unstructured":"S. Prakasam. Status of CEPAS deployment. Land Transport Authority http:\/\/www.itsc.org.sg\/upload\/download\/aicp\/CEPAS_Update.pdf 2010.  S. Prakasam. Status of CEPAS deployment. Land Transport Authority http:\/\/www.itsc.org.sg\/upload\/download\/aicp\/CEPAS_Update.pdf 2010."},{"key":"e_1_3_2_1_43_1","first-page":"36","article-title":"The evolution of e-payments in public transport: Singapore's experience","volume":"50","author":"Prakasam S.","year":"2008","unstructured":"S. Prakasam . The evolution of e-payments in public transport: Singapore's experience . Japan Railway & Transport Review , 50 : 36 -- 38 , 2008 . S. Prakasam. The evolution of e-payments in public transport: Singapore's experience. Japan Railway & Transport Review, 50:36--38, 2008.","journal-title":"Japan Railway & Transport Review"},{"key":"e_1_3_2_1_44_1","unstructured":"L. Qing.Singapore NFC services to finally go live. http:\/\/www.zdnet.com\/sg\/singapore-nfc-services-to-finally-go-live-7000002071\/  L. Qing.Singapore NFC services to finally go live. http:\/\/www.zdnet.com\/sg\/singapore-nfc-services-to-finally-go-live-7000002071\/"},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the 1st International Workshop on Privacy in Location-Based Applications (PilBA)","author":"Sadeghi A.","year":"2008","unstructured":"A. Sadeghi , I. Visconti , and C. Wachsmann . User privacy in transport systems based on RFID e-tickets . In Proceedings of the 1st International Workshop on Privacy in Location-Based Applications (PilBA) , 2008 . A. Sadeghi, I. Visconti, and C. Wachsmann. User privacy in transport systems based on RFID e-tickets. In Proceedings of the 1st International Workshop on Privacy in Location-Based Applications (PilBA), 2008."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/795665.796534"},{"key":"e_1_3_2_1_47_1","volume-title":"The application's digital signature cannot be verified. Do you want to run the application? http:\/\/www.symantec.com\/docs\/TECH143548","author":"Symantec Corporation","year":"2010","unstructured":"Symantec Corporation . The application's digital signature cannot be verified. Do you want to run the application? http:\/\/www.symantec.com\/docs\/TECH143548 , 2010 . Symantec Corporation. The application's digital signature cannot be verified. Do you want to run the application? http:\/\/www.symantec.com\/docs\/TECH143548, 2010."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_49_1","first-page":"34","article-title":"Implementing an enhanced integrated fare system for Singapore","volume":"53","author":"Sim L.","year":"2004","unstructured":"L. Sim , E. Seow , and S. Prakasam . Implementing an enhanced integrated fare system for Singapore . Public Transport International , 53 : 34 -- 37 , 2004 . L. Sim, E. Seow, and S. Prakasam. Implementing an enhanced integrated fare system for Singapore. Public Transport International, 53:34--37, 2004.","journal-title":"Public Transport International"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.02.027"},{"key":"e_1_3_2_1_51_1","volume-title":"Specification for contactless e-purse application. SS 518","author":"Standard Singapore","year":"2006","unstructured":"Singapore Standard . Specification for contactless e-purse application. SS 518 : 2006 . Singapore Standard. Specification for contactless e-purse application. SS 518:2006."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00862-7_24"},{"key":"e_1_3_2_1_53_1","unstructured":"Transport for London. What is Oyster? http:\/\/www.tfl.gov.uk\/tickets\/14836.aspx.  Transport for London. What is Oyster? http:\/\/www.tfl.gov.uk\/tickets\/14836.aspx."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_8"},{"key":"e_1_3_2_1_55_1","unstructured":"USBlyzer. USB Protocol Analyzer and USB Traffic Sniffer for Windows. http:\/\/www.usblyzer.com\/.  USBlyzer. USB Protocol Analyzer and USB Traffic Sniffer for Windows. http:\/\/www.usblyzer.com\/."},{"key":"e_1_3_2_1_56_1","volume-title":"Privacy-preserving data mining. Advances in Information Security 19","author":"Vaidya J.","year":"2006","unstructured":"J. Vaidya , C. Clifton , and M. Zhu . Privacy-preserving data mining. Advances in Information Security 19 . Springer , 2006 . J. Vaidya, C. Clifton, and M. Zhu. Privacy-preserving data mining. Advances in Information Security 19. Springer, 2006."},{"key":"e_1_3_2_1_57_1","unstructured":"Wireshark. Go Deep. http:\/\/www.wireshark.org\/.  Wireshark. Go Deep. http:\/\/www.wireshark.org\/."}],"event":{"name":"CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Berlin Germany","acronym":"CCS'13"},"container-title":["Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517840.2517848","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2517840.2517848","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:14Z","timestamp":1750232054000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517840.2517848"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,4]]},"references-count":57,"alternative-id":["10.1145\/2517840.2517848","10.1145\/2517840"],"URL":"https:\/\/doi.org\/10.1145\/2517840.2517848","relation":{},"subject":[],"published":{"date-parts":[[2013,11,4]]},"assertion":[{"value":"2013-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}