{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T20:34:55Z","timestamp":1776976495540,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T00:00:00Z","timestamp":1659052800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,29]]},"DOI":"10.1145\/3556223.3556264","type":"proceedings-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T01:57:27Z","timestamp":1665971847000},"page":"269-275","source":"Crossref","is-referenced-by-count":2,"title":["Design and Implementation of a Secure and Distributed Electronic Voucher Management System"],"prefix":"10.1145","author":[{"given":"M. Fahim Ferdous","family":"Khan","sequence":"first","affiliation":[{"name":"Faculty of Information Networking for Innovation and Design (INIAD), Toyo University, Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ken","family":"Sakamura","sequence":"additional","affiliation":[{"name":"Faculty of Information Networking for Innovation and Design (INIAD), Toyo University, Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2022,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Retrieved","author":"Dictionary Cambridge English","year":"2022","unstructured":"Cambridge English Dictionary . Voucher : Meaning in the Cambridge Online English Dictionary . Retrieved July 18, 2022 from https:\/\/dictionary.cambridge.org\/dictionary\/english\/voucher Cambridge English Dictionary. Voucher: Meaning in the Cambridge Online English Dictionary. Retrieved July 18, 2022 from https:\/\/dictionary.cambridge.org\/dictionary\/english\/voucher"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.977753"},{"key":"e_1_3_2_1_3_1","first-page":"1","volume-title":"4th IFIP International Conference on New Technologies, Mobility and Security","author":"Khan T. Yashiro MFF.","year":"2011","unstructured":"T. Yashiro MFF. Khan , S. Ito , M. Bessho , S. Kobayashi , T. Usaka , N. Koshizuka , K. Sakamura . 2011 . eTNet: A smart card network architecture for flexible electronic commerce services . 4th IFIP International Conference on New Technologies, Mobility and Security , pp 1 - 5 . https:\/\/doi.org\/10.1109\/NTMS.2011.5720616 T. Yashiro MFF. Khan, S. Ito, M. Bessho, S. Kobayashi, T. Usaka, N. Koshizuka, K. Sakamura. 2011. eTNet: A smart card network architecture for flexible electronic commerce services. 4th IFIP International Conference on New Technologies, Mobility and Security, pp 1-5. https:\/\/doi.org\/10.1109\/NTMS.2011.5720616"},{"key":"e_1_3_2_1_4_1","volume-title":"Programming manual of eTRON client library","author":"Ubiquitous Networking Laboratory YRP","year":"2007","unstructured":"YRP Ubiquitous Networking Laboratory , Programming manual of eTRON client library , 2007 . YRP Ubiquitous Networking Laboratory, Programming manual of eTRON client library, 2007."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.40"},{"key":"e_1_3_2_1_6_1","unstructured":"Ubiquitous ID Center Japan. Retrieved July 18 2022 from http:\/\/www.uidcenter.org\/  Ubiquitous ID Center Japan. Retrieved July 18 2022 from http:\/\/www.uidcenter.org\/"},{"key":"e_1_3_2_1_7_1","unstructured":"The $40 Million Counterfeit Coupon Caper. Retrieved July 18 2022 from https:\/\/business.time.com\/2012\/07\/19\/the-40-million-counterfeit-coupon-caper\/  The $40 Million Counterfeit Coupon Caper. Retrieved July 18 2022 from https:\/\/business.time.com\/2012\/07\/19\/the-40-million-counterfeit-coupon-caper\/"},{"key":"e_1_3_2_1_8_1","volume-title":"Yang Efficient E-coupon systems with strong user privacy. Telecommun Syst 64, 695\u2013708","author":"Liu W.","year":"2017","unstructured":"W. Liu , Y. Mu , G. Yang Efficient E-coupon systems with strong user privacy. Telecommun Syst 64, 695\u2013708 ( 2017 ). https:\/\/doi.org\/10.1007\/s11235-016-0201-3 W. Liu, Y. Mu, G. Yang Efficient E-coupon systems with strong user privacy. Telecommun Syst 64, 695\u2013708 (2017). https:\/\/doi.org\/10.1007\/s11235-016-0201-3"},{"key":"e_1_3_2_1_9_1","volume-title":"ACNS","author":"Canard S.","year":"2006","unstructured":"S. Canard , A. Gouget , E. Hufschmitt . 2006 . A Handy Multi-coupon System. In: Zhou, J., Yung, M., Bao, F. (eds) Applied Cryptography and Network Security . ACNS 2006. Lecture Notes in Computer Science, vol 3989. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/11767480_5 S. Canard, A. Gouget, E. Hufschmitt. 2006. A Handy Multi-coupon System. In: Zhou, J., Yung, M., Bao, F. (eds) Applied Cryptography and Network Security. ACNS 2006. Lecture Notes in Computer Science, vol 3989. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/11767480_5"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11507840_12"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11889663_22"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"I.G. Tende K. Aburada H. Yamaba 2022. Proposal for a blockchain based agricultural input voucher system. Artif Life Robotics. https:\/\/doi.org\/10.1007\/s10015-021-00724-9  I.G. Tende K. Aburada H. Yamaba 2022. Proposal for a blockchain based agricultural input voucher system. Artif Life Robotics. https:\/\/doi.org\/10.1007\/s10015-021-00724-9","DOI":"10.1109\/GCCE53005.2021.9622001"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/su12083362"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387940.3391500"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3152765"},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"E-Voucher System Development for Social Assistance with Blockchain Technology, 2021 International Conference on ICT for Smart Society (ICISS)","author":"Akbar J.","year":"2021","unstructured":"J. Akbar and R. Munir . 2021 . E-Voucher System Development for Social Assistance with Blockchain Technology, 2021 International Conference on ICT for Smart Society (ICISS) , 2021 , pp. 1 - 6 , doi: 10.1109\/ICISS53185.2021.9532498. J. Akbar and R. Munir. 2021. E-Voucher System Development for Social Assistance with Blockchain Technology, 2021 International Conference on ICT for Smart Society (ICISS), 2021, pp. 1-6, doi: 10.1109\/ICISS53185.2021.9532498."},{"key":"e_1_3_2_1_17_1","volume-title":"Retrieved","author":"IEC","year":"2022","unstructured":"ISO\/ IEC 7816-8:2021 : Identification cards \u2013 Integrated circuit cards \u2013 Part 8: Commands and mechanisms for security operations . Retrieved July 18, 2022 from https:\/\/www.iso.org\/standard\/79893.html ISO\/IEC 7816-8:2021: Identification cards \u2013 Integrated circuit cards \u2013 Part 8: Commands and mechanisms for security operations. Retrieved July 18, 2022 from https:\/\/www.iso.org\/standard\/79893.html"},{"key":"e_1_3_2_1_18_1","volume-title":"Retrieved","author":"IEC","year":"2022","unstructured":"ISO\/ IEC 14443-4:2018 : Cards and security devices for personal identification \u2013 Contactless proximity objects \u2013 Part 4: Transmission protocol . Retrieved July 18, 2022 from https:\/\/www.iso.org\/standard\/73599.html. ISO\/IEC 14443-4:2018: Cards and security devices for personal identification \u2013 Contactless proximity objects \u2013 Part 4: Transmission protocol. Retrieved July 18, 2022 from https:\/\/www.iso.org\/standard\/73599.html."}],"event":{"name":"ICCCM 2022: The 10th International Conference on Computer and Communications Management","location":"Okayama Japan","acronym":"ICCCM 2022"},"container-title":["The 10th International Conference on Computer and Communications Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3556223.3556264","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3556223.3556264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:32Z","timestamp":1750186832000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3556223.3556264"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,29]]},"references-count":18,"alternative-id":["10.1145\/3556223.3556264","10.1145\/3556223"],"URL":"https:\/\/doi.org\/10.1145\/3556223.3556264","relation":{},"subject":[],"published":{"date-parts":[[2022,7,29]]}}}