1. K. Aoki, E.J. Downes, An analysis of young people’s use of and attitudes toward cell phones. Telematics Inform. 20(4), 349–364 (2003)
2. N. Ben-Asher, H. Sieger, A. Ben-Oved, N. Kirschnick, J. Meyer, S. Möller, On the need for different security methods on mobile phones, in Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI 2011) (2011)
3. S. Bitam, A. Mellouk, S. Zeadally, VANET-cloud: a generic cloud computing model for vehicular ad-hoc networks. IEEE Wirel. Commun. Mag. 2(1), 96–102 (2015)
4. C.-L. Chen, W.-C. Tsai, Using a stored-value card to provide an added-value service of payment protocol in vanet, in Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2013) (2013), pp. 660–665
5. C. Cox, S. Sanchez, Transforming the customer experience: the promise of mobile wallets. Technical report, First Data Thought Leadership (2013), http://tex.stackexchange.com/questions/5957/bibtex-entry-for-white-papers-and-technical-reports