{"id":"https://openalex.org/W4312798035","doi":"https://doi.org/10.1145/3556223.3556264","title":"Design and Implementation of a Secure and Distributed Electronic Voucher Management System","display_name":"Design and Implementation of a Secure and Distributed Electronic Voucher Management System","publication_year":2022,"publication_date":"2022-07-29","ids":{"openalex":"https://openalex.org/W4312798035","doi":"https://doi.org/10.1145/3556223.3556264"},"language":"en","primary_location":{"id":"doi:10.1145/3556223.3556264","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3556223.3556264","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 10th International Conference on Computer and Communications Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021658691","display_name":"M. Fahim Ferdous Khan","orcid":"https://orcid.org/0000-0002-6584-3944"},"institutions":[{"id":"https://openalex.org/I158123994","display_name":"Toyo University","ror":"https://ror.org/059d6yn51","country_code":"JP","type":"education","lineage":["https://openalex.org/I158123994"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"M. Fahim Ferdous Khan","raw_affiliation_strings":["Faculty of Information Networking for Innovation and Design (INIAD), Toyo University, Japan"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Networking for Innovation and Design (INIAD), Toyo University, Japan","institution_ids":["https://openalex.org/I158123994"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102277205","display_name":"Ken Sakamura","orcid":null},"institutions":[{"id":"https://openalex.org/I158123994","display_name":"Toyo University","ror":"https://ror.org/059d6yn51","country_code":"JP","type":"education","lineage":["https://openalex.org/I158123994"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Ken Sakamura","raw_affiliation_strings":["Faculty of Information Networking for Innovation and Design (INIAD), Toyo University, Japan"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Networking for Innovation and Design (INIAD), Toyo University, Japan","institution_ids":["https://openalex.org/I158123994"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5021658691"],"corresponding_institution_ids":["https://openalex.org/I158123994"],"apc_list":null,"apc_paid":null,"fwci":0.6381,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.76329905,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"269","last_page":"275"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/voucher","display_name":"Voucher","score":0.9883020520210266},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6812042593955994},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6487863063812256},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5975762605667114},{"id":"https://openalex.org/keywords/electronic-business","display_name":"Electronic business","score":0.43433359265327454},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.42022082209587097},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.30383527278900146},{"id":"https://openalex.org/keywords/business-model","display_name":"Business model","score":0.26299747824668884},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.182012140750885},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.09840226173400879}],"concepts":[{"id":"https://openalex.org/C105458232","wikidata":"https://www.wikidata.org/wiki/Q689044","display_name":"Voucher","level":2,"score":0.9883020520210266},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6812042593955994},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6487863063812256},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5975762605667114},{"id":"https://openalex.org/C65257409","wikidata":"https://www.wikidata.org/wiki/Q734253","display_name":"Electronic business","level":3,"score":0.43433359265327454},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.42022082209587097},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.30383527278900146},{"id":"https://openalex.org/C4216890","wikidata":"https://www.wikidata.org/wiki/Q815823","display_name":"Business model","level":2,"score":0.26299747824668884},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.182012140750885},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.09840226173400879},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3556223.3556264","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3556223.3556264","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 10th International Conference on Computer and Communications Management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47999998927116394,"id":"https://metadata.un.org/sdg/1","display_name":"No poverty"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1531287038","https://openalex.org/W1536498494","https://openalex.org/W1972982820","https://openalex.org/W2083697499","https://openalex.org/W2104559655","https://openalex.org/W2160871277","https://openalex.org/W2494751855","https://openalex.org/W3018968332","https://openalex.org/W3088852339","https://openalex.org/W3199991841","https://openalex.org/W4200391361","https://openalex.org/W4212982771","https://openalex.org/W4230096340"],"related_works":["https://openalex.org/W2089326551","https://openalex.org/W3172637988","https://openalex.org/W191455635","https://openalex.org/W2168015441","https://openalex.org/W3201867060","https://openalex.org/W2022862609","https://openalex.org/W2376196821","https://openalex.org/W2541718874","https://openalex.org/W2393045963","https://openalex.org/W2005787671"],"abstract_inverted_index":{"Dealing":[0],"with":[1],"vouchers,":[2],"paper":[3],"or":[4],"electronic,":[5],"for":[6],"both":[7,68],"in-store":[8],"and":[9,43,71,80],"online":[10],"purchases":[11],"is":[12,57],"a":[13,32,58,78],"common":[14],"customer":[15],"experience.":[16],"Electronic":[17],"vouchers":[18,48],"are":[19,50],"most":[20],"popular":[21],"in":[22,53],"recent":[23],"times":[24],"as":[25,61],"they":[26],"can":[27,65],"be":[28],"distributed":[29],"easily":[30],"to":[31,104],"wide":[33],"range":[34],"of":[35,45,97],"customers":[36],"through":[37],"the":[38,41,87,94],"Internet.":[39],"Maintaining":[40],"security":[42,63],"privacy":[44],"these":[46],"electronic":[47,82,99],"which":[49],"now":[51],"ubiquitous":[52],"today's":[54],"cyber":[55],"marketspaces":[56],"major":[59],"challenge,":[60],"poor":[62],"measures":[64],"badly":[66],"impact":[67],"business":[69],"owners":[70],"customers.":[72],"In":[73],"this":[74],"paper,":[75],"we":[76],"propose":[77],"secure":[79],"tamper-resistant":[81],"voucher":[83,100],"management":[84],"system":[85,92],"using":[86],"eTRON":[88],"cybersecurity":[89],"architecture.":[90],"Our":[91],"implements":[93],"full":[95],"lifecycle":[96],"an":[98],"from":[101],"its":[102],"creation":[103],"redemption.":[105]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2026-04-24T08:23:43.765630","created_date":"2025-10-10T00:00:00"}
