{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T12:07:52Z","timestamp":1695989272315},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2013,2,22]],"date-time":"2013-02-22T00:00:00Z","timestamp":1361491200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1007\/s00607-013-0306-4","type":"journal-article","created":{"date-parts":[[2013,2,21]],"date-time":"2013-02-21T04:09:12Z","timestamp":1361419752000},"page":"587-611","source":"Crossref","is-referenced-by-count":10,"title":["Design, implementation, and performance analysis of a secure payment protocol in a payment gateway centric model"],"prefix":"10.1007","volume":"96","author":[{"given":"Jes\u00fas T\u00e9llez","family":"Isaac","sequence":"first","affiliation":[]},{"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,2,22]]},"reference":[{"issue":"9","key":"306_CR1","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/2.612244","volume":"30","author":"N Asokan","year":"1997","unstructured":"Asokan N, Janson PA, Steiner M, Waidner M (1997) The state of the art in electronic payment systems. IEEE Comput 30(9):28\u201335","journal-title":"IEEE Comput"},{"issue":"3","key":"306_CR2","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1016\/S0160-791X(02)00012-X","volume":"24","author":"HC Yu","year":"2002","unstructured":"Yu HC, Hsi KH, Kuo PJ (2002) Electronic payment systems: an analysis and comparison of types. Technol Soc 24(3):331\u2013347","journal-title":"Technol Soc"},{"key":"306_CR3","unstructured":"Kungpisdan S (2005) Design and analysis of secure mobile payment systems. PhD thesis, Monash University"},{"key":"306_CR4","unstructured":"Gonz\u00e1lez JAO (2006) Multi-party non-repudation protocols and applications. PhD thesis, University of Malaga (Campus de Teatinos)"},{"issue":"12","key":"306_CR5","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/MC.2010.357","volume":"43","author":"N Leavitt","year":"2010","unstructured":"Leavitt N (2010) Payment applications make e-commerce mobile. Computer 43(12):19\u201322","journal-title":"Computer"},{"key":"306_CR6","doi-asserted-by":"crossref","unstructured":"Antovski L, Gusev M (2003) M-payments. In: 25th international conference on informafion technology inferfaces (ITI\u20192003), pp 16\u201319","DOI":"10.1109\/ITI.2003.1225328"},{"key":"306_CR7","unstructured":"Siau K, Sheng H, Nah FFH (2004) The value of mobile commerce to customers. Third annual workshop on HCI research in MIS, pp 65\u201369"},{"key":"306_CR8","unstructured":"Song X (2001) Mobile payment and security. Helsinki University of Technology Telecommunications Software and Multimedia Laboratory. http:\/\/www.tml.tkk.fi\/Studies\/T-110.501\/2001\/papers\/xing.song.pdf"},{"issue":"4","key":"306_CR9","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/MITP.2012.82","volume":"14","author":"N Kshetri","year":"2012","unstructured":"Kshetri N (2012) Mobile payments in emerging markets. IT Prof 14(4):9\u201313","journal-title":"IT Prof"},{"key":"306_CR10","doi-asserted-by":"crossref","unstructured":"Chita Kiran N, Kumar GN (2011) Building robust m-commerce payment system on offline wireless network. In: IEEE 5th international conference on advanced networks and telecommunication systems (ANTS\u2019 2011), pp 1\u20133","DOI":"10.1109\/ANTS.2011.6163664"},{"key":"306_CR11","unstructured":"Hu ZY, Liu YW, Hu X, Li JH (2004) Anonymous micropayments authentication (ama) in mobile data network. In: 23rd annual joint conference of the IEEE computer and communications societies (INFOCOM\u20192004), pp 46\u201353"},{"issue":"2","key":"306_CR12","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1016\/j.elerap.2006.07.002","volume":"6","author":"RJ Hwang","year":"2007","unstructured":"Hwang RJ, Shiau SH, Jan DF (2007) A new mobile payment scheme for roaming services. Electron Commer Res Appl 6(2):184\u2013191","journal-title":"Electron Commer Res Appl"},{"issue":"3","key":"306_CR13","first-page":"337","volume":"9","author":"R Martinez-Pelaez","year":"2010","unstructured":"Martinez-Pelaez R, Rico-Novella FJ, Satizabal C (2010) Study of mobile payment protocols and its performance evaluation on mobile devices. Int J Inf Technol Manag 9(3):337\u2013356","journal-title":"Int J Inf Technol Manag"},{"key":"306_CR14","doi-asserted-by":"crossref","unstructured":"Chari S, Kermani P, Smith S, Tassiulas L (2001) Security issues in m-commerce: a usage-based taxonomy. E-commerce agents, marketplace solutions, security issues, and supply and demand, pp 264\u2013282","DOI":"10.1007\/3-540-45370-9_16"},{"key":"306_CR15","unstructured":"Hall J, Kilbank S, Barbeau M, Kranakis E (2001) Wpp A secure payment protocol for supporting credit-and debit-card transactions over wireless networks. In: International conference on telecommunications (ICT\u20192001)"},{"key":"306_CR16","unstructured":"Hong Wang EK (2003) Secure wireless payment protocol. International conference on wireless networks, pp 576\u2013582"},{"key":"306_CR17","unstructured":"Lei Y, Chen D, Jiang Z (2004) Generating digital signatures on mobile devices. In: 8th international conference on advanced information networking and applications (AINA\u20192004), pp 532\u2013535"},{"issue":"4","key":"306_CR18","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1023\/B:ELEC.0000037082.39182.3a","volume":"4","author":"SK Misra","year":"2004","unstructured":"Misra SK, Wickramasinghe N (2004) Security of a mobile transaction: a trust model. Electron Commer Res 4(4):359\u2013372","journal-title":"Electron Commer Res"},{"key":"306_CR19","doi-asserted-by":"crossref","unstructured":"Hassinen M, Hypp\u00f6nen K, Haataja K (2006) An open, pki-based mobile payment system. In: International conference emerging trends in information and communication security (ETRICS\u20192006), pp 86\u2013100","DOI":"10.1007\/11766155_7"},{"issue":"1","key":"306_CR20","first-page":"59","volume":"1","author":"SBR Kumar","year":"2010","unstructured":"Kumar SBR, Rabara SA (2010) Mpcs: secure account-based mobile payment system. Int J Inf Process Manag 1(1):59\u201369","journal-title":"Int J Inf Process Manag"},{"key":"306_CR21","unstructured":"Alizadeh MV, Moghaddam RA, Momenebellah S (2011) New mobile payment protocol: mobile pay center protocol (mpcp). In: 3rd international conference on electronics computer technology (ICECT)\u20192011), pp 74\u201378"},{"key":"306_CR22","doi-asserted-by":"crossref","unstructured":"Brahma M, Patra GK, Thangavelu RP, Kumar VA (2011) Mobile based payment model for hpc clouds. In: International conference on recent trends in information technology (ICRTIT\u2019 2011), pp 189\u2013193","DOI":"10.1109\/ICRTIT.2011.5972361"},{"issue":"3","key":"306_CR23","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/s10660-011-9078-0","volume":"11","author":"F Buccafurri","year":"2011","unstructured":"Buccafurri F, Lax G (2011) Implementing disposable credit card numbers by mobile phones. Electron Commer Res 11(3):271\u2013296","journal-title":"Electron Commer Res"},{"key":"306_CR24","unstructured":"Launiainen T (2009) A comparison of mobile authentication methods. http:\/\/www.cse.tkk.fi\/en\/publications\/B\/5\/papers\/Launiainen_final.pdf"},{"key":"306_CR25","doi-asserted-by":"crossref","unstructured":"Shuai F, You J, Zhensong L (2010) Research on symmetric key-based mobile payment protocol security. In: IEEE international conference on information theory and information, security (ICITIS\u20192010), pp 340\u2013344","DOI":"10.1109\/ICITIS.2010.5689606"},{"key":"306_CR26","unstructured":"Bellare M, Rogaway P (1993) Entity authentication and key distribution. In: Advances in cryptology (CRYPTO\u20191993), pp 232\u2013249"},{"key":"306_CR27","unstructured":"Kohl J, Neuman BC (1993) The kerberos network authentication service (version 5). Technical report, IETF RFC1510"},{"issue":"9","key":"306_CR28","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"BC Neuman","year":"1994","unstructured":"Neuman BC, Ts\u2019o T (1994) Kerberos: an authentication service for computer networks. IEEE Commun 32(9):33\u201338","journal-title":"IEEE Commun"},{"issue":"3","key":"306_CR29","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/219618.219714","volume":"13","author":"W Ford","year":"1995","unstructured":"Ford W (1995) Advances in public-key certificate standards. ACM SIGSAC Rev 13(3):9\u201315","journal-title":"ACM SIGSAC Rev"},{"key":"306_CR30","unstructured":"Housley R, Ford W, Polk W, Solo D (1999) Internet x.509 public key infrastructure certificateand crl profile. Technical report, IETF RFC2459"},{"key":"306_CR31","doi-asserted-by":"crossref","unstructured":"Bakhtiari S, Baraani A, Khayyambashi MR (2009) Mobicash: A new anonymous mobile payment system implemented by elliptic curve cryptography. World Congress on computer science and information engineering, pp 286\u2013290","DOI":"10.1109\/CSIE.2009.939"},{"issue":"1","key":"306_CR32","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s10660-010-9047-z","volume":"10","author":"OR Vincent","year":"2010","unstructured":"Vincent OR, Folorunso O, Akinde A (2010) Improving e-payment security using elliptic curve cryptosystem. Electron Commer Res 10(1):27\u201341","journal-title":"Electron Commer Res"},{"key":"306_CR33","unstructured":"Wu X, Dandash O, Le PD, Srinivasan B (2006) The design and implementation of a wireless payment system. In: First international conference on communication system software and middleware (Comsware\u20192006), pp 1\u20135"},{"key":"306_CR34","doi-asserted-by":"crossref","unstructured":"Torres J, Carbonell M, T\u00e9llez J, Sierra JM (2008) Application of network smart cards to citizens identification systems. In: Smart card research and advanced applications, 8th IFIP WG 8.8\/11.2 international conference (CARDIS\u20192008), pp 241\u2013254","DOI":"10.1007\/978-3-540-85893-5_18"},{"key":"306_CR35","doi-asserted-by":"crossref","unstructured":"Gao J, Kulkarni V, Ranavat H, Chang L (2009) A 2d barcode-based mobile payment system. In: Third international conference on multimedia and ubiquitous, engineering (MUE\u20192009), pp 320\u2013329","DOI":"10.1109\/MUE.2009.62"},{"key":"306_CR36","unstructured":"Lee J, Cho CH, Jun MS (2011) Secure quick response-payment(qr-pay) system using mobile device. In: 13th international conference on advanced communication technology (ICACT\u20192011), pp 1424\u20131427"},{"issue":"3","key":"306_CR37","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"NK Ratha","year":"2001","unstructured":"Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614\u2013634","journal-title":"IBM Syst J"},{"key":"306_CR38","doi-asserted-by":"crossref","unstructured":"Xi K, Ahmad T, Han F, Hu J (2010) A fingerprint based bio-cryptographic security protocol designed for client\/server authentication in mobile computing environment. Secur Commun Netw 4(5):487\u2013499","DOI":"10.1002\/sec.225"},{"key":"306_CR39","doi-asserted-by":"crossref","unstructured":"Asokan N (1994) Anonymity in mobile computing environment. In: First workshop on mobile computing systems and applications (WMCSA\u20191994), pp 200\u2013204","DOI":"10.1109\/WMCSA.1994.9"},{"issue":"2","key":"306_CR40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/jtaer1020009","volume":"1","author":"JT Isaac","year":"2006","unstructured":"Isaac JT, Camara JS, Manzanares AI, M\u00e1rquez JT (2006) Anonymous payment in a kiosk centric model using digital signature scheme with message recovery and low computational power devices. J. Theor. Appl. Electron. Commer. Res. 1(2):1\u201311","journal-title":"J. Theor. Appl. Electron. Commer. Res."},{"key":"306_CR41","doi-asserted-by":"crossref","unstructured":"Isaac JT, C\u00e1mara JS (2007) A secure payment protocol for restricted connectivity scenarios in m-commerce. In: 8th international conference E-commerce and web technologies (EC-Web\u20192007), pp 1\u201310","DOI":"10.1007\/978-3-540-74563-1_1"},{"issue":"2","key":"306_CR42","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/s10660-010-9052-2","volume":"10","author":"JT Isaac","year":"2010","unstructured":"Isaac JT, Zeadally S, Camara JS (2010) Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks. Electron Commer Res 10(2):209\u2013233","journal-title":"Electron Commer Res"},{"key":"306_CR43","unstructured":"Sekhar VC, Sarvabhatla M (2012) A secure kiosk centric mobile payment protocol using symmetric key techniques. In: 7th IEEE international conference on industrial and, information systems (ICIIS\u20192012), pp 1\u20136"},{"key":"306_CR44","doi-asserted-by":"crossref","unstructured":"Li W, Wen Q, Su Q, Zhengping, (2012) An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Comput Commun 35(2):188\u2013195","DOI":"10.1016\/j.comcom.2011.09.003"},{"issue":"1","key":"306_CR45","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s10660-011-9086-0","volume":"12","author":"JT Isaac","year":"2012","unstructured":"Isaac JT, Zeadally S, Camara JS (2012) A lightweight secure mobile payment protocol for vehicular ad-hoc networks (vanets). Electron Commer Res 12(1):97\u2013123","journal-title":"Electron Commer Res"},{"key":"306_CR46","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1016\/j.procs.2012.06.097","volume":"10","author":"JT Isaac","year":"2012","unstructured":"Isaac JT, Zeadally S (2012) An anonymous secure payment protocol in a payment gateway centric model. Proc Comput Sci 10:758\u2013765","journal-title":"Proc Comput Sci"},{"issue":"1","key":"306_CR47","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1147\/sj.371.0072","volume":"37","author":"JL Abad-peiro","year":"1997","unstructured":"Abad-peiro JL, Asokan N, Steiner M, Waidner M (1997) Designing a generic payment service. IBM Syst J 37(1):72\u201388","journal-title":"IBM Syst J"},{"key":"306_CR48","doi-asserted-by":"crossref","unstructured":"Kungpisdan S, Srinivasan B, Le PD (2003) Lightweight mobile credit-card payment protocol. In: 4th international conference on cryptology in India (Progress in Cryptology, INDOCRYPT\u20192003), pp 295\u2013308","DOI":"10.1007\/978-3-540-24582-7_22"},{"key":"306_CR49","doi-asserted-by":"crossref","unstructured":"Krawczyk H, Bellare M, Canetti R (1997) Hmac: keyed-hashing for message authentication (rfc 2104)","DOI":"10.17487\/rfc2104"},{"issue":"4","key":"306_CR50","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1109\/49.839936","volume":"18","author":"M Bellare","year":"2000","unstructured":"Bellare M, Garay JA, Hauser R, Herzberg A, Krawczyk H, Steiner M, Tsudik G, Herreweghen EV, Waidner M (2000) Design, implementation, and deployment of the ikp secure electronic payment system. IEEE J Select Areas Commun 18(4):611\u2013627","journal-title":"IEEE J Select Areas Commun"},{"key":"306_CR51","unstructured":"Mastercard Visa (1997) Set protocol specifications book, pp 1\u20133"},{"key":"306_CR52","unstructured":"Toh BTS, Kungpisdan S, Le PD (2004) Ksl protocol: design and implementation. In: IEEE conference on cybernetics and intelligent systems, pp 544\u2013549"},{"key":"306_CR53","unstructured":"Sun Microsystem (2008) Java platform, micro edition (java me), api specification. http:\/\/java.sun.com\/javame\/index.jsp"},{"key":"306_CR54","unstructured":"Fun TS, Beng LY, Likoh J, Roslan R (2008) A lightweight and private mobile payment protocol by using mobile network operator. International conference on computer and communication engineering, pp 162\u2013166"},{"key":"306_CR55","unstructured":"Sun Microsystem (2008) Java platform, micro edition (java se) v 1.6.0, api specification. http:\/\/java.sun.com\/javase\/index.jsp"},{"key":"306_CR56","doi-asserted-by":"crossref","unstructured":"Zhao H, Muftic S (2011) The concept of secure mobile wallet. In: World congress on internet, security (WorldCIS\u20192011), pp 54\u201358","DOI":"10.1109\/WorldCIS17046.2011.5749882"},{"key":"306_CR57","unstructured":"The Legion of the Bouncy Castle (2008) The legion of the bouncy castle java cryptography apis version 1.4. http:\/\/www.bouncycastle.org"},{"key":"306_CR58","unstructured":"NIST (2001) Fips pub 197 advance encryption standard (aes). http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"306_CR59","unstructured":"S\u00e1nchez-Avila C, S\u00e1nchez-Reillol R (2001) The rijndael block cipher (aes proposal): a comparison with des. In: 35th IEEE international Carnahan conference on security, technology, pp 229\u2013234"},{"key":"306_CR60","volume-title":"Handbook of applied cryptography","author":"A Menezes","year":"1997","unstructured":"Menezes A, Oorschot PV, Vanstone S (1997) Handbook of applied cryptography. CRC Press Inc, Boca Raton"},{"key":"306_CR61","volume-title":"Enterprise J2ME: developing mobile Java applications","author":"MJ Yuan","year":"2003","unstructured":"Yuan MJ (2003) Enterprise J2ME: developing mobile Java applications. PTR, Prentice Hall"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-013-0306-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-013-0306-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-013-0306-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T03:34:51Z","timestamp":1644377691000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-013-0306-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2,22]]},"references-count":61,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2014,7]]}},"alternative-id":["306"],"URL":"https:\/\/doi.org\/10.1007\/s00607-013-0306-4","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,2,22]]}}}