{"id":"https://openalex.org/W2510587932","doi":"https://doi.org/10.1109/iscc.2016.7543781","title":"TrustPAY: Trusted mobile payment on security enhanced ARM TrustZone platforms","display_name":"TrustPAY: Trusted mobile payment on security enhanced ARM TrustZone platforms","publication_year":2016,"publication_date":"2016-06-01","ids":{"openalex":"https://openalex.org/W2510587932","doi":"https://doi.org/10.1109/iscc.2016.7543781","mag":"2510587932"},"language":"en","primary_location":{"id":"doi:10.1109/iscc.2016.7543781","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2016.7543781","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Symposium on Computers and Communication (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100537337","display_name":"Xianyi Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xianyi Zheng","raw_affiliation_strings":["University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101717525","display_name":"Lulu Yang","orcid":"https://orcid.org/0009-0000-0361-6458"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lulu Yang","raw_affiliation_strings":["University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101477958","display_name":"Jiangang Ma","orcid":"https://orcid.org/0000-0002-8449-7610"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiangang Ma","raw_affiliation_strings":["University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106405285","display_name":"Gang Shi","orcid":"https://orcid.org/0009-0006-7152-9210"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gang Shi","raw_affiliation_strings":["University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101525317","display_name":"Dan Meng","orcid":"https://orcid.org/0000-0002-0872-3540"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dan Meng","raw_affiliation_strings":["University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100537337"],"corresponding_institution_ids":["https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":4.1585,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.94573829,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"456","last_page":"462"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.770835280418396},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7053138613700867},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5337131023406982},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5199981331825256},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.49107789993286133},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.48600348830223083},{"id":"https://openalex.org/keywords/mobile-payment","display_name":"Mobile payment","score":0.46291688084602356},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4247549772262573},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.4167841374874115},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3395773768424988},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.1976473331451416},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09641784429550171}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.770835280418396},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7053138613700867},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5337131023406982},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5199981331825256},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.49107789993286133},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.48600348830223083},{"id":"https://openalex.org/C160949748","wikidata":"https://www.wikidata.org/wiki/Q1365703","display_name":"Mobile payment","level":3,"score":0.46291688084602356},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4247549772262573},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.4167841374874115},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3395773768424988},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.1976473331451416},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09641784429550171}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc.2016.7543781","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2016.7543781","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Symposium on Computers and Communication (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W165306667","https://openalex.org/W2011034765","https://openalex.org/W2014880891","https://openalex.org/W2020936921","https://openalex.org/W2089405347","https://openalex.org/W2091250790","https://openalex.org/W2097723548","https://openalex.org/W3133580985"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2048100608","https://openalex.org/W2090296580","https://openalex.org/W1576249345","https://openalex.org/W4243905374","https://openalex.org/W2785815065","https://openalex.org/W1796074903","https://openalex.org/W2548001946","https://openalex.org/W4245955065","https://openalex.org/W2078545362"],"abstract_inverted_index":{"Recent":[0],"technological":[1],"advances":[2],"have":[3,104],"accelerated":[4],"the":[5,153],"design":[6],"and":[7,20,25,49,55,61,70,98,117,125,143],"deployment":[8],"of":[9,11,38,46,156,171],"kinds":[10,170],"secure":[12,172],"applications":[13,173],"on":[14,87,109,129],"smartphones.":[15],"Although":[16],"users":[17,43],"can":[18,93,150],"access":[19],"handle":[21],"their":[22],"data":[23,48,73],"flexibly":[24],"stably":[26],"with":[27,160],"mobile":[28,68,83],"devices,":[29,33],"not":[30],"only":[31],"computing":[32],"it":[34],"poses":[35],"security":[36,89,97,144,154],"challenges":[37],"a":[39,82,106,110,130,157],"new":[40],"dimension":[41],"that":[42,147],"disclose":[44],"lots":[45],"sensitive":[47,72],"privacy":[50,100,176],"information":[51],"over":[52],"open":[53],"devices":[54],"networks":[56],"as":[57],"well.":[58],"Thus,":[59],"more":[60,62],"malwares":[63],"are":[64],"emerging":[65],"to":[66,168,175],"compromise":[67],"OS":[69],"steal":[71],"from":[74],"these":[75],"applications.":[76],"In":[77],"this":[78],"paper,":[79],"we":[80],"propose":[81],"payment":[84,95],"framework":[85],"TrustPAY":[86,164],"TrustZone":[88],"enhanced":[90],"platform,":[91],"which":[92],"ensure":[94],"transactions":[96],"realize":[99],"friendly":[101],"payment.":[102],"We":[103],"implemented":[105],"prototype":[107],"system":[108],"simulation":[111],"environment":[112],"by":[113,134],"using":[114,135],"ARM":[115,123,136],"FastModel":[116],"Open":[118],"Virtualization":[119],"software":[120],"stack":[121],"for":[122],"TrustZone,":[124],"presented":[126],"our":[127,148],"implementation":[128],"real":[131],"development":[132],"board":[133],"CoreTile":[137],"Express":[138],"A9\u00d74.":[139],"Our":[140],"experiment":[141],"evaluation":[142],"analysis":[145],"prove":[146],"scheme":[149],"effectively":[151],"meet":[152],"requirements":[155],"practical":[158],"m-payment":[159],"acceptable":[161],"performance.":[162],"Furthermore,":[163],"is":[165],"also":[166],"flexible":[167],"support":[169],"requiring":[174],"protection.":[177]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
