{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:01:13Z","timestamp":1725465673279},"publisher-location":"New York","reference-count":14,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"0387250913"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-26325-x_18","type":"book-chapter","created":{"date-parts":[[2005,10,24]],"date-time":"2005-10-24T04:36:54Z","timestamp":1130128614000},"page":"175-185","source":"Crossref","is-referenced-by-count":0,"title":["Micropayments with Privacy \u2014 a New Proposal for E-commerce"],"prefix":"10.1007","author":[{"given":"Krzysztof","family":"Szczypiorski","sequence":"first","affiliation":[]},{"given":"Aneta","family":"Zwierko","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Margasi\u0144ski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","first-page":"217","volume":"875","author":"J.-P. Boly","year":"1994","unstructured":"Boly, J-P., Bosselaers, A., Pedersen, T. et al.: The ESPRIT Project CAFE. ESORICS 94, Springer-Verlag LNCS Vol. 875 (1994) 217\u2013230","journal-title":"The ESPRIT Project CAFE. ESORICS 94"},{"key":"18_CR2","unstructured":"Dai, X., Grundy, J.: Architecture of a Micro-payment System for Thinclient Web Applications. Proceedings of the 2002 International Conference on Internet Computing (2002)"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Dierks T., Allen C.: The TLS-Protocol Version 1.0. IETF RFC 2246 (1999)","DOI":"10.17487\/rfc2246"},{"key":"18_CR4","unstructured":"Ellis, C.: Evaluation of Micropayment Schemes. Tech Report HPL-97-14 (1997)"},{"key":"18_CR5","unstructured":"Goldberg, I., Shostack, A. Freedom Network 1.0 Architecture and Protocols. Zero-Knowledge Systems. White Paper, 1999."},{"key":"18_CR6","unstructured":"Hauser, R., Steiner, M, Waidner, M.: Micro-Payments based on iKP. Research Report 2791 (# 89269), IBM Research (1996)"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Hubaux, J-P., Buttyan, L.: A Micro-Payment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks. Financial Cryptography'03 (2003)","DOI":"10.1007\/978-3-540-45126-6_2"},{"key":"18_CR8","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/3-540-63594-7_77","volume":"1318","author":"S. Jarecki","year":"1998","unstructured":"Jarecki, S., Od\u0142y\u017cko, A.: An Efficient Micropayment System Based on Probabilistic Polling. Financial Cryptography '97, Springer-Verlag LNCS Vol. 1318 (1998) 173\u2013191","journal-title":"Financial Cryptography '97"},{"key":"18_CR9","unstructured":"Margasi\u0144ski, I., Szczypiorski, K.: VAST: Versatile Anonymous System for Web Users. Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems, Springer-Verlag (2004)"},{"key":"18_CR10","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Inc. (1997)"},{"key":"18_CR11","first-page":"149","volume":"2271","author":"S. Micali","year":"2002","unstructured":"Micali, S., Rivest, R.: Micropayments Revisited. CT-RSA 2002, Springer-Verlag LNCS Vol. 2271 (2002) 149\u2013163","journal-title":"Micropayments Revisited"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Pedersen, T.: Electronic Payments of Small Amounts. Technical Report IDAMI PB-495 (1995)","DOI":"10.7146\/dpb.v24i495.7023"},{"key":"18_CR13","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/3-540-63594-7_87","volume":"1318","author":"R. Rivest","year":"1998","unstructured":"Rivest, R.: Electronic Lottery Tickets as Micropayments. Financial Cryptography '97, Springer-Verlag LNCS Vol. 1318 (1998) 307\u2013314","journal-title":"Financial Cryptography '97"},{"key":"18_CR14","first-page":"69","volume":"1189","author":"R. Rivest","year":"1997","unstructured":"Rivest, R., Shamir, A.: PayWord and MicroMint: Two simple micropayment schemes. Proceedings of 1996 International Workshop on Security Protocols, Springer-Verlag LNCS Vol. 1189 (1997) 69\u201387","journal-title":"Proceedings of 1996 International Workshop on Security Protocols"}],"container-title":["Information Processing and Security Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-26325-X_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:02:42Z","timestamp":1605643362000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-26325-X_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["0387250913"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/0-387-26325-x_18","relation":{},"subject":[]}}