{"id":"https://openalex.org/W2036154704","doi":"https://doi.org/10.1145/2442882.2442886","title":"Practical receipt authentication for branchless banking","display_name":"Practical receipt authentication for branchless banking","publication_year":2013,"publication_date":"2013-01-11","ids":{"openalex":"https://openalex.org/W2036154704","doi":"https://doi.org/10.1145/2442882.2442886","mag":"2036154704"},"language":"en","primary_location":{"id":"doi:10.1145/2442882.2442886","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2442882.2442886","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM Symposium on Computing for Development","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076323005","display_name":"Saurabh Panjwani","orcid":null},"institutions":[{"id":"https://openalex.org/I72090969","display_name":"Nokia (United States)","ror":"https://ror.org/038km2573","country_code":"US","type":"company","lineage":["https://openalex.org/I2738502077","https://openalex.org/I72090969"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Saurabh Panjwani","raw_affiliation_strings":["Bell Labs India","Bell Labs, India"],"affiliations":[{"raw_affiliation_string":"Bell Labs India","institution_ids":[]},{"raw_affiliation_string":"Bell Labs, India","institution_ids":["https://openalex.org/I72090969"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5076323005"],"corresponding_institution_ids":["https://openalex.org/I72090969"],"apc_list":null,"apc_paid":null,"fwci":3.3422,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.93064984,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13194","display_name":"ICT in Developing Communities","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13194","display_name":"ICT in Developing Communities","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9312999844551086,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9246000051498413,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7355815172195435},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7222093343734741},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6722562313079834},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6221314072608948},{"id":"https://openalex.org/keywords/mobile-banking","display_name":"Mobile banking","score":0.5715172290802002},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.5471814870834351},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5150117874145508},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.5107195377349854},{"id":"https://openalex.org/keywords/man-in-the-middle-attack","display_name":"Man-in-the-middle attack","score":0.46172112226486206},{"id":"https://openalex.org/keywords/vendor","display_name":"Vendor","score":0.444053590297699},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.412492036819458},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.2597734034061432},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.10789066553115845}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7355815172195435},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7222093343734741},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6722562313079834},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6221314072608948},{"id":"https://openalex.org/C2775930393","wikidata":"https://www.wikidata.org/wiki/Q1941439","display_name":"Mobile banking","level":2,"score":0.5715172290802002},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5471814870834351},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5150117874145508},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.5107195377349854},{"id":"https://openalex.org/C196491621","wikidata":"https://www.wikidata.org/wiki/Q554830","display_name":"Man-in-the-middle attack","level":3,"score":0.46172112226486206},{"id":"https://openalex.org/C2777338717","wikidata":"https://www.wikidata.org/wiki/Q1762621","display_name":"Vendor","level":2,"score":0.444053590297699},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.412492036819458},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2597734034061432},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.10789066553115845},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2442882.2442886","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2442882.2442886","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM Symposium on Computing for Development","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.388.3587","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.388.3587","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://dev3.acmdev.org/papers/dev-final38.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1548691389","https://openalex.org/W1969590955","https://openalex.org/W1982170863","https://openalex.org/W1997754586","https://openalex.org/W2003590000","https://openalex.org/W2012965406","https://openalex.org/W2013623332","https://openalex.org/W2013746326","https://openalex.org/W2136764359","https://openalex.org/W2138670865","https://openalex.org/W2142411122","https://openalex.org/W2228124837","https://openalex.org/W2254691854","https://openalex.org/W2266218113","https://openalex.org/W2273298738","https://openalex.org/W4210531213","https://openalex.org/W4285719527","https://openalex.org/W6929243220"],"related_works":["https://openalex.org/W2058034608","https://openalex.org/W3155578322","https://openalex.org/W177107229","https://openalex.org/W2188559950","https://openalex.org/W2486658553","https://openalex.org/W4387799680","https://openalex.org/W4308237908","https://openalex.org/W2390393033","https://openalex.org/W2765151622","https://openalex.org/W3110184528"],"abstract_inverted_index":{"Although":[0],"branchless":[1,84,157],"banking":[2,85,158],"systems":[3,20,37,57],"have":[4,21,53],"spread":[5],"to":[6,14,46,76,79,98,101,148,152],"different":[7],"parts":[8],"of":[9,26,29,41,60,92,129],"the":[10,39,99,124],"developing":[11],"world,":[12],"methods":[13],"ensure":[15],"transactional":[16],"security":[17],"in":[18,64,83],"these":[19],"seen":[22],"slower":[23],"adoption":[24],"because":[25],"a":[27,71,137],"variety":[28],"operational":[30],"constraints.":[31],"A":[32],"basic":[33],"requirement":[34,63],"from":[35,96,106],"such":[36],"is":[38],"provision":[40],"secure":[42],"and":[43,50,73,109,132],"reliable":[44],"receipts":[45,82,105],"users":[47,78,97],"during":[48],"transactions,":[49],"recent":[51],"attacks":[52,155],"demonstrated":[54],"that":[55],"existing":[56],"fall":[58],"short":[59],"fulfilling":[61],"this":[62,67],"practice.":[65],"In":[66],"paper,":[68],"we":[69],"propose":[70],"simple":[72],"practical":[74,139],"protocol":[75,88,125],"enable":[77],"authenticate":[80],"transaction":[81],"systems.":[86,159],"Our":[87],"makes":[89],"novel":[90],"use":[91,149],"missed":[93,150],"calls":[94,151],"(sent":[95],"bank)":[100],"help":[102],"distinguish":[103],"real":[104],"spoofed":[107],"ones":[108],"can":[110],"be":[111],"implemented":[112],"on":[113,156],"any":[114],"mobile":[115],"phone,":[116],"without":[117],"software":[118],"installation.":[119],"Besides":[120],"preventing":[121],"spoofing":[122],"attacks,":[123],"enjoys":[126],"significant":[127],"advantages":[128],"usability,":[130],"efficiency":[131],"cost,":[133],"which":[134],"make":[135],"it":[136],"more":[138],"choice":[140],"than":[141],"other":[142],"schemes.":[143],"We":[144],"also":[145],"discuss":[146],"ways":[147],"mitigate":[153],"man-in-the-middle":[154]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
