{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:36:30Z","timestamp":1742387790175},"publisher-location":"Boston, MA","reference-count":23,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781402081460"},{"type":"electronic","value":"9781402081477"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/1-4020-8147-2_5","type":"book-chapter","created":{"date-parts":[[2006,2,20]],"date-time":"2006-02-20T11:57:38Z","timestamp":1140436658000},"page":"67-81","source":"Crossref","is-referenced-by-count":3,"title":["Privacy Protecting Protocols for Revokable Digital Signatures"],"prefix":"10.1007","author":[{"given":"Istv\u00e1n Zsolt","family":"Berta","sequence":"first","affiliation":[]},{"given":"Levente","family":"Butty\u00e1n","sequence":"additional","affiliation":[]},{"given":"Istv\u00e1n","family":"Vajda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","volume-title":"Authentication and Delegation with Smart-cards","author":"M. Abadi","year":"1992","unstructured":"Abadi, M., Burrows, M., Kaufman, C., and Lampson, B. (1992). Authentication and Delegation with Smart-cards. Theoretical Aspects of Computer Software: Proc. of the International Conference TACS\u201991, Springer, Berlin, Heidelberg."},{"unstructured":"Anonymizer Inc. (1999).. http:\/\/www.anonymizer.com.","key":"5_CR2"},{"doi-asserted-by":"crossref","unstructured":"Asokan, N., Debar, Herv\u00e9, Steiner, Michael, and Waidner, Michael (1999). Authenticating Public Terminals. Computer Networks, 1999.","key":"5_CR3","DOI":"10.1016\/S1389-1286(98)00020-6"},{"doi-asserted-by":"crossref","unstructured":"Berta, I. Zs. and Vajda, I. (2003). Documents from Malicious Terminals. SPIE Microtechnologies for the New Millenium 2003, Bioengineered and Bioinspired Systems, Maspalomas, Spain.","key":"5_CR4","DOI":"10.1117\/12.498617"},{"key":"5_CR5","volume-title":"Mitigating the Untrusted Terminal Problem Using Conditional Signatures","author":"I. Z. Berta","year":"2004","unstructured":"Berta, Istv\u00e1n Zsolt, Butty\u00e1n, Levente, and Vajda, Istv\u00e1n (2004). Mitigating the Untrusted Terminal Problem Using Conditional Signatures. Proceedings of International Conference on Information Technology ITCC 2004, IEEE, 2004, IEEE, Las Vegas, NV, USA, April."},{"key":"5_CR6","first-page":"302","volume":"773","author":"S. A. Brands","year":"1994","unstructured":"Brands, S. A. (1994). Untraceable off-line cash in wallets with observers. In Crypto\u201993 Springer-Verlag, LNCS 773 pp. 302\u2013318.","journal-title":"LNCS"},{"issue":"2","key":"5_CR7","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, David (1981). Untraceable electronic mail, return addresses and digital pseudonyms. Communications of the ACM, v24, n.2 pp.84\u201388.","journal-title":"Communications of the ACM"},{"unstructured":"Chaum, David (1982). Blind signatures for untraceable payments. Advances in Proceedings of Crypto 82, D. Chaum, R.L. Rivest, & A.T. Sherman (Eds.), Plenum, pp. 199\u2013203.","key":"5_CR8"},{"doi-asserted-by":"crossref","unstructured":"Clarke, Dwaine, Gassend, Blaise, Kotwal, Thomas, Burnside, Matt, Dijk, Marten van, Devadas, Srinivas, and Rivest, Ronald (2002). The Untrusted Computer Problem and Camera-Based Authentication.","key":"5_CR9","DOI":"10.1007\/3-540-45866-2_10"},{"unstructured":"Franklin, M. and Yung, M. (1992). Towards provably secure efficient electronic cash. Columbia Univ. Dept. of CS TR CSUCS-018-92.","key":"5_CR10"},{"key":"5_CR11","volume-title":"Mix-based electronic payments","author":"M. Jakobsson","year":"1998","unstructured":"Jakobsson, M. and Ra\u00efhi, D. (1998). Mix-based electronic payments. Fifth Annual Workshop on Selected Areas in Cryptography (SAC\u201998), Queen\u2019s University, Kingston, Ontario, Canada."},{"unstructured":"Lee, B and Kim, K (2002). Fair Exchange of Digital Signatures using Conditional Signature. SCIS 2002, Symposium on Cryptography and Information Security.","key":"5_CR12"},{"doi-asserted-by":"crossref","unstructured":"Matsumoto, T (1996). Human-Computer cryptography: An attempt. In ACM Conference on Computer and Communications Security, pp 68\u201375.","key":"5_CR13","DOI":"10.1145\/238168.238190"},{"key":"5_CR14","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/BF00196774","volume":"2","author":"M. Naor","year":"1991","unstructured":"Naor, Moni (1991). Bit Commitment Using Pseudo-Randomness. Journal of Cryptology: the journal of the International Association for Cryptologic Research, volume 2, pp 151\u2013158.","journal-title":"Journal of Cryptology: the journal of the International Association for Cryptologic Research"},{"doi-asserted-by":"crossref","unstructured":"Naor, Moni and Pinkas, Benny (1997). Visual Authentication and Identification. Lecture Notes in Computer Science, volume 1294.","key":"5_CR15","DOI":"10.1007\/BFb0052245"},{"key":"5_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BFb0053419","volume":"950","author":"M. Naor","year":"1995","unstructured":"Naor, Moni and Shamir, Adi (1995). Visual Cryptography. Lecture Notes in Computer Science, vol 950, pp 1\u201312, 1995, http:\/\/citeseer.nj.nac.com\/naor95visual.html .","journal-title":"Lecture Notes in Computer Science"},{"unstructured":"Rankl, W. and Effing, W. (1997). Smart Card Handbook. John Wiley & Sons, 2nd edition, ISBN: 0471988758.","key":"5_CR17"},{"unstructured":"Rivest, R (2001). Issues in Cryptography. Computers, Freedom, Privacy 2001 Conference http:\/\/theory.lcs.mit.edu\/~rivest\/Rivest-IssuessInCryptography.pdf.","key":"5_CR18"},{"unstructured":"Schneier, B. and Shostack, A. (1999). Breaking up is Hard to do: Modelling security threats for smart cards. USENIX Workshop on Smart Card Technology, Chicago, Illinois, USA, http:\/\/www.counterpane.com\/smart-card-threats.html .","key":"5_CR19"},{"unstructured":"Schneier, Bruce (1996). Applied Cryptography. John Wiley & Sons, ISBN: 0471117099.","key":"5_CR20"},{"unstructured":"Schneier, Bruce (1999). The Solitaire Encryption Algorithm. http:\/\/www.counterpane.com\/solitaire.htm.","key":"5_CR21"},{"unstructured":"Stabell-Kulo, Tage, Arild, Ronny, and Myrvang, Per Harald (1999). Providing Authentication to Messages Signed with a Smart Card in Hostile Environments. Usenix Workshop on Smart Card Technology, Chicago, Illinois, USA, May 10\u201311, 1999.","key":"5_CR22"},{"doi-asserted-by":"crossref","unstructured":"Syverson, Paul, F., Goldschlag, David M., and Reed, Michael G. (1997). Anonymous Connections and Onion Routing. IEEE Symposium on Security and Privacy, Oakland, California.","key":"5_CR23","DOI":"10.1109\/SECPRI.1997.601314"}],"container-title":["IFIP International Federation for Information Processing","Smart Card Research and Advanced Applications VI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8147-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,12]],"date-time":"2020-04-12T16:42:20Z","timestamp":1586709740000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8147-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9781402081460","9781402081477"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8147-2_5","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2004]]}}}