{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:09:35Z","timestamp":1759133375837,"version":"3.41.0"},"reference-count":47,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2017,1,16]],"date-time":"2017-01-16T00:00:00Z","timestamp":1484524800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61303212, 61332019, and U1135004"],"award-info":[{"award-number":["61303212, 61332019, and U1135004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Fundamental Research Founds for National University"},{"name":"Hubei Provincial Natural Science Foundation of China","award":["2014CFB192"],"award-info":[{"award-number":["2014CFB192"]}]},{"name":"China University of Geosciences, Wuhan"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2017,5,31]]},"abstract":"<jats:p>Ensuring the security and privacy of vehicular ad hoc networks (VANETs) and related services such as secure payment has been the focus of recent research efforts. Existing secure payment solutions generally require stable and reliable network connection. This is, however, a challenge in a VANET setting. Drive-thru Internet, a secure payment solution for VANETs, involves a great number of fast-moving vehicles competing for connections\/communications simultaneously. Thus, service providers may find it challenging to provide real-time payment services or may have to sacrifice the confidentiality and the authenticity of payment vouchers for usability. In this article, we propose a secure installment payment framework for drive-thru Internet deployment in a VANET setting. The framework also provides the capability to embody properties such as confidentiality of payment vouchers, offline signature verification, periodical reconciliation, and installment payment. Performance evaluation and security analysis demonstrate the utility of the framework in a VANET setting.<\/jats:p>","DOI":"10.1145\/3014584","type":"journal-article","created":{"date-parts":[[2017,1,17]],"date-time":"2017-01-17T13:42:08Z","timestamp":1484660528000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["SIPF"],"prefix":"10.1145","volume":"16","author":[{"given":"Jun","family":"Song","sequence":"first","affiliation":[{"name":"China University of Geosciences, Wuhan, P. R. China"}]},{"given":"Fan","family":"Yang","sequence":"additional","affiliation":[{"name":"China University of Geosciences, Wuhan, P. R. China"}]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[{"name":"China University of Geosciences, University of Texas at San Antonio, San Antonio, TX"}]},{"given":"Zhijian","family":"Zhuang","sequence":"additional","affiliation":[{"name":"China University of Geosciences, Wuhan, P. R. China"}]},{"given":"Lizhe","family":"Wang","sequence":"additional","affiliation":[{"name":"China University of Geosciences, Wuhan, P. R. China"}]}],"member":"320","published-online":{"date-parts":[[2017,1,16]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.4018\/japuc.2012040101"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.02.036"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2238566"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_20"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813721"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2013.08.011"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2013.119"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.07.015"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1321"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2515517"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_20"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.188"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.188"},{"key":"e_1_2_1_14_1","first-page":"329","article-title":"Implication of secure micropayment system using process oriented structural design by hash chaining in mobile network","volume":"9","author":"Chitra Kiran N.","year":"2012","journal-title":"International Journal of Computer Science Issues"},{"key":"e_1_2_1_15_1","first-page":"441","article-title":"Fully homomorphic encryption over the integers with shorter public keys","volume":"2011","author":"Coron Jean-S\u00e9bastien","year":"2011","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxu120"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2095432"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.02.020"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2015.7146029"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9067-9"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-012-0696-1"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v6i4.2166"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2012.06.097"},{"volume-title":"Introduction to Modern Cryptography","author":"Katz Jonathan","key":"e_1_2_1_24_1"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0129054109006607"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2308215"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2561241"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.09.003"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.36"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.138"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2014.05.001"},{"volume-title":"Secure Vehicular Communication Systems","author":"Papadimitratos Panos","key":"e_1_2_1_32_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-5906-5_643"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1949317.1949360"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2006.1682880"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_11"},{"volume-title":"Secure authentication in motion: A novel online payment framework for drive-thru Internet. Future Generation Computer Systems. Available online","year":"2016","author":"Song Jun","key":"e_1_2_1_37_1"},{"volume-title":"Svein Johan Knapskog, and Sugata Sanyal","year":"2011","author":"Tiwari Ayu","key":"e_1_2_1_38_1"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2009.271"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3642"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0720-3"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2401012"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6363664"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.45"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2302296"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2014.6990403"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3014584","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3014584","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:59Z","timestamp":1750273499000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3014584"}},"subtitle":["A Secure Installment Payment Framework for Drive-Thru Internet"],"short-title":[],"issued":{"date-parts":[[2017,1,16]]},"references-count":47,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,5,31]]}},"alternative-id":["10.1145\/3014584"],"URL":"https:\/\/doi.org\/10.1145\/3014584","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2017,1,16]]},"assertion":[{"value":"2015-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-01-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}