{"id":"https://openalex.org/W2311290100","doi":"https://doi.org/10.1145/2857546.2857565","title":"A Novel Authentication Protocol for Micropayment with Wearable Devices","display_name":"A Novel Authentication Protocol for Micropayment with Wearable Devices","publication_year":2016,"publication_date":"2016-01-04","ids":{"openalex":"https://openalex.org/W2311290100","doi":"https://doi.org/10.1145/2857546.2857565","mag":"2311290100"},"language":"en","primary_location":{"id":"doi:10.1145/2857546.2857565","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2857546.2857565","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022262409","display_name":"Alexander Yohan","orcid":"https://orcid.org/0000-0002-3816-1577"},"institutions":[{"id":"https://openalex.org/I154864474","display_name":"National Taiwan University of Science and Technology","ror":"https://ror.org/00q09pe49","country_code":"TW","type":"education","lineage":["https://openalex.org/I154864474"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Alexander Yohan","raw_affiliation_strings":["Department of Information Management, National Taiwan University of Science and Technology, Taipei 106, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, National Taiwan University of Science and Technology, Taipei 106, Taiwan","institution_ids":["https://openalex.org/I154864474"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084154323","display_name":"Nai\u2010Wei Lo","orcid":"https://orcid.org/0000-0003-4622-4977"},"institutions":[{"id":"https://openalex.org/I154864474","display_name":"National Taiwan University of Science and Technology","ror":"https://ror.org/00q09pe49","country_code":"TW","type":"education","lineage":["https://openalex.org/I154864474"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Nai-Wei Lo","raw_affiliation_strings":["Department of Information Management, National Taiwan University of Science and Technology, Taipei 106, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, National Taiwan University of Science and Technology, Taipei 106, Taiwan","institution_ids":["https://openalex.org/I154864474"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013973664","display_name":"Vincentius Randy","orcid":null},"institutions":[{"id":"https://openalex.org/I154864474","display_name":"National Taiwan University of Science and Technology","ror":"https://ror.org/00q09pe49","country_code":"TW","type":"education","lineage":["https://openalex.org/I154864474"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Vincentius Randy","raw_affiliation_strings":["Department of Information Management, National Taiwan University of Science and Technology, Taipei 106, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, National Taiwan University of Science and Technology, Taipei 106, Taiwan","institution_ids":["https://openalex.org/I154864474"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085507075","display_name":"Shih-Jen Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I3141939062","display_name":"Institute for Information Industry","ror":"https://ror.org/01d8kr740","country_code":"TW","type":"nonprofit","lineage":["https://openalex.org/I3141939062"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Shih-Jen Chen","raw_affiliation_strings":["Institute for Information Industry, Taipei 106, Taiwan"],"affiliations":[{"raw_affiliation_string":"Institute for Information Industry, Taipei 106, Taiwan","institution_ids":["https://openalex.org/I3141939062"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075032228","display_name":"Ming-Yuan Hsu","orcid":null},"institutions":[{"id":"https://openalex.org/I3141939062","display_name":"Institute for Information Industry","ror":"https://ror.org/01d8kr740","country_code":"TW","type":"nonprofit","lineage":["https://openalex.org/I3141939062"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ming-Yuan Hsu","raw_affiliation_strings":["Institute for Information Industry, Taipei 106, Taiwan"],"affiliations":[{"raw_affiliation_string":"Institute for Information Industry, Taipei 106, Taiwan","institution_ids":["https://openalex.org/I3141939062"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5022262409"],"corresponding_institution_ids":["https://openalex.org/I154864474"],"apc_list":null,"apc_paid":null,"fwci":1.327,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.85189385,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7891075611114502},{"id":"https://openalex.org/keywords/wearable-computer","display_name":"Wearable computer","score":0.7549246549606323},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5818962454795837},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5801325440406799},{"id":"https://openalex.org/keywords/wearable-technology","display_name":"Wearable technology","score":0.5386540293693542},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5286489129066467},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.514584481716156},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.49477332830429077},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4779481887817383},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.46014297008514404},{"id":"https://openalex.org/keywords/bluetooth","display_name":"Bluetooth","score":0.4415220320224762},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.42241063714027405},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4183118939399719},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.35540974140167236},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.34633249044418335},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.14012661576271057},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09219571948051453}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7891075611114502},{"id":"https://openalex.org/C150594956","wikidata":"https://www.wikidata.org/wiki/Q1334829","display_name":"Wearable computer","level":2,"score":0.7549246549606323},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5818962454795837},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5801325440406799},{"id":"https://openalex.org/C54290928","wikidata":"https://www.wikidata.org/wiki/Q4845080","display_name":"Wearable technology","level":3,"score":0.5386540293693542},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5286489129066467},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.514584481716156},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.49477332830429077},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4779481887817383},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.46014297008514404},{"id":"https://openalex.org/C546215728","wikidata":"https://www.wikidata.org/wiki/Q39531","display_name":"Bluetooth","level":3,"score":0.4415220320224762},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.42241063714027405},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4183118939399719},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.35540974140167236},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.34633249044418335},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.14012661576271057},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09219571948051453},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2857546.2857565","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2857546.2857565","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.75,"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1970049226","https://openalex.org/W2012025519","https://openalex.org/W2014062028","https://openalex.org/W2030818913","https://openalex.org/W2034249680","https://openalex.org/W2048277279","https://openalex.org/W2087039861","https://openalex.org/W2090019451","https://openalex.org/W2105103777","https://openalex.org/W2119046642","https://openalex.org/W2157154635","https://openalex.org/W2166132492","https://openalex.org/W2187799921"],"related_works":["https://openalex.org/W2355452447","https://openalex.org/W1536503377","https://openalex.org/W2466913372","https://openalex.org/W2406792259","https://openalex.org/W2362358462","https://openalex.org/W2355344682","https://openalex.org/W2785513402","https://openalex.org/W1493058717","https://openalex.org/W3045615609","https://openalex.org/W2148481610"],"abstract_inverted_index":{"Wearable":[0],"devices":[1,34,111],"show":[2],"rapid":[3],"market":[4],"growth":[5],"in":[6,41,83,92,134],"the":[7,46,64,67,88,135,140,149,161],"last":[8],"five":[9],"years.":[10],"General":[11],"application":[12],"areas":[13],"include":[14],"fitness":[15],"trackers,":[16],"watches,":[17],"glasses,":[18],"smart":[19],"clothing,":[20],"and":[21,56,66,120,139],"healthcare.":[22],"Recently,":[23],"it":[24],"becomes":[25],"a":[26,36,54],"hot":[27],"topic":[28],"for":[29,77,125,160],"people":[30],"to":[31,38,51,62,106,147],"adopt":[32],"wearable":[33,78,110,136,142],"as":[35,87,113],"tool":[37],"conduct":[39],"micropayment":[40,108],"their":[42],"daily":[43],"life.":[44],"Given":[45],"sensitivity":[47],"of":[48,69,152],"required":[49],"information":[50],"perform":[52],"micropayment,":[53],"robust":[55],"secure":[57],"authentication":[58,104,117],"protocol":[59,105,118],"is":[60],"necessary":[61],"ensure":[63,148],"security":[65,75,89,150,158],"credibility":[68],"all":[70],"transmitted":[71],"information.":[72],"The":[73],"existing":[74],"mechanism":[76,90],"device":[79,137],"technology":[80],"only":[81],"resides":[82],"network":[84],"layer":[85],"such":[86,112],"used":[91],"Bluetooth":[93],"Low":[94],"Energy":[95],"(BLE)":[96],"standard.":[97],"In":[98],"this":[99],"paper,":[100],"we":[101,156],"propose":[102],"an":[103],"support":[107],"using":[109],"smart-watch.":[114],"Our":[115],"proposed":[116,162],"generates":[119],"utilizes":[121],"unique":[122],"session":[123],"key":[124],"each":[126],"communication":[127],"process":[128],"along":[129],"with":[130],"secret":[131],"string":[132],"stored":[133],"(WD)":[138],"corresponding":[141],"payment":[143],"counter":[144],"(WP":[145],"counter)":[146],"robustness":[151],"our":[153],"protocol.":[154,163],"Finally,":[155],"present":[157],"analysis":[159]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
