{"id":"https://openalex.org/W1513000838","doi":"https://doi.org/10.1109/asiajcis.2015.10","title":"Secure Electronic Coupons","display_name":"Secure Electronic Coupons","publication_year":2015,"publication_date":"2015-05-01","ids":{"openalex":"https://openalex.org/W1513000838","doi":"https://doi.org/10.1109/asiajcis.2015.10","mag":"1513000838"},"language":"en","primary_location":{"id":"doi:10.1109/asiajcis.2015.10","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asiajcis.2015.10","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 10th Asia Joint Conference on Information Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038550838","display_name":"Chin\u2010Chen Chang","orcid":"https://orcid.org/0000-0002-7319-5780"},"institutions":[{"id":"https://openalex.org/I4880106","display_name":"Feng Chia University","ror":"https://ror.org/05vhczg54","country_code":"TW","type":"education","lineage":["https://openalex.org/I4880106"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Chin-Chen Chang","raw_affiliation_strings":["Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan","institution_ids":["https://openalex.org/I4880106"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100834850","display_name":"Iuon\u2010Chang Lin","orcid":"https://orcid.org/0009-0002-3367-6317"},"institutions":[{"id":"https://openalex.org/I3141906898","display_name":"Asia University","ror":"https://ror.org/01cyq8n55","country_code":"JP","type":"education","lineage":["https://openalex.org/I3141906898"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Iuon-Chang Lin","raw_affiliation_strings":["Department of Management Information Systems, Asia University"],"affiliations":[{"raw_affiliation_string":"Department of Management Information Systems, Asia University","institution_ids":["https://openalex.org/I3141906898"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110393007","display_name":"Yi-Lun Chi","orcid":null},"institutions":[{"id":"https://openalex.org/I207776796","display_name":"Overseas Chinese University","ror":"https://ror.org/01j9jq089","country_code":"TW","type":"education","lineage":["https://openalex.org/I207776796"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yi-Lun Chi","raw_affiliation_strings":["Department of Computer Science and Information Engineering, Overseas Chinese University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, Overseas Chinese University","institution_ids":["https://openalex.org/I207776796"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5038550838"],"corresponding_institution_ids":["https://openalex.org/I4880106"],"apc_list":null,"apc_paid":null,"fwci":0.9985,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.78148206,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"1233","issue":null,"first_page":"104","last_page":"109"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/coupon","display_name":"Coupon","score":0.8033814430236816},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.7251414060592651},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.65281742811203},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5179328322410583},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.45275306701660156},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.34219664335250854},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3352294862270355}],"concepts":[{"id":"https://openalex.org/C2779307704","wikidata":"https://www.wikidata.org/wiki/Q11794832","display_name":"Coupon","level":2,"score":0.8033814430236816},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.7251414060592651},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.65281742811203},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5179328322410583},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.45275306701660156},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.34219664335250854},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3352294862270355},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/asiajcis.2015.10","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asiajcis.2015.10","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 10th Asia Joint Conference on Information Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W586539710","https://openalex.org/W1517043006","https://openalex.org/W1549228503","https://openalex.org/W1552749006","https://openalex.org/W1600432225","https://openalex.org/W1991669906","https://openalex.org/W2021266328","https://openalex.org/W2033778422","https://openalex.org/W2036723469","https://openalex.org/W2078935701","https://openalex.org/W2107761921","https://openalex.org/W2129257011","https://openalex.org/W2138784757","https://openalex.org/W2151812848","https://openalex.org/W4240614542","https://openalex.org/W4250314891","https://openalex.org/W4251962533","https://openalex.org/W6630892144"],"related_works":["https://openalex.org/W2974050152","https://openalex.org/W1481018110","https://openalex.org/W3150641959","https://openalex.org/W2200893828","https://openalex.org/W2606802280","https://openalex.org/W2083573183","https://openalex.org/W2767277193","https://openalex.org/W2285295461","https://openalex.org/W1537782856","https://openalex.org/W2106608244"],"abstract_inverted_index":{"Coupons":[0],"are":[1,71,105,134],"well-known":[2],"and":[3,17,42,140],"widely":[4],"used":[5,66,83,100,115],"in":[6],"the":[7,131,142],"market":[8],"place":[9],"to":[10,18,38,52,67,74,101,107],"attract":[11],"new":[12,34,41,94],"customers":[13,27],"looking":[14],"for":[15,25,33,92,125,136,144],"deals":[16],"keep":[19],"loyal":[20,26,43,127],"customers.":[21,35,76,95,109,118,128],"Generally":[22],"speaking,":[23],"coupons":[24,32],"have":[28],"more":[29,90,123],"discount":[30],"than":[31],"In":[36],"order":[37],"differentiate":[39],"between":[40],"customers,":[44],"we":[45],"invented":[46],"two":[47],"schemes":[48,133],"that":[49,70,104],"allow":[50],"firms":[51],"issue":[53],"different":[54],"types":[55],"of":[56,130],"e-coupons":[57,69,103,112],"through":[58],"a":[59],"wireless":[60],"network.":[61],"The":[62,96],"first":[63],"scheme":[64,88,98,121],"is":[65,89,99,122],"generate":[68,102],"not":[72],"assigned":[73,106],"specific":[75,108],"Thus,":[77,110],"an":[78],"unused":[79,111],"e-coupon":[80],"can":[81],"be":[82,114],"by":[84,116],"any":[85],"customer.":[86],"This":[87,119],"suitable":[91,124],"attracting":[93],"other":[97,117],"cannot":[113],"second":[120],"keeping":[126],"Both":[129],"proposed":[132],"designed":[135],"mobile":[137],"electronic":[138],"commerce":[139],"reduces":[141],"cost":[143],"processing":[145],"coupons.":[146]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
