{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:50:19Z","timestamp":1725475819491},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540677420"},{"type":"electronic","value":"9783540450306"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10718964_12","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T21:04:09Z","timestamp":1167426249000},"page":"134-148","source":"Crossref","is-referenced-by-count":1,"title":["Passive Entities: A Strategy for Electronic Payment Design"],"prefix":"10.1007","author":[{"given":"Ernest","family":"Foo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Abadi, M., Needham, R.: Prudent Engineering Practice for Cryptographic Protocols. In: Proceedings of the 1994 IEEE Symposium on Security and Privacy, pp. 122\u2013136 (1994)","key":"12_CR1","DOI":"10.1109\/RISP.1994.296587"},{"unstructured":"Bellare, M., Garay, J.A., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Waidner, M.: iKP \u2013 A Family of Secure Electronic Payment Protocols. In: Proceedings of the First Usenix Workshop on Electronic Commerce, New York (1995)","key":"12_CR2"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","first-page":"302","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"S. Brands","year":"1993","unstructured":"Brands, S.: Untraceable Off-line Cash in Wallets with Observers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 302\u2013318. Springer, Heidelberg (1993)"},{"doi-asserted-by":"crossref","unstructured":"Brands, S.: Electronic Cash on the Internet. In: Proceedings of the Internet Society 1995 Symposium on Network and Distributed System Security, pp. 64\u201384 (1995)","key":"12_CR4","DOI":"10.1109\/NDSS.1995.390644"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/3-540-61770-1_26","volume-title":"Computer Security - ESORICS 96","author":"J. Camenisch","year":"1996","unstructured":"Camenisch, J., Maurer, U., Stadler, M.: Digital Payment Systems with Passive Anonymity-Revoking Trustees. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol.\u00a01146, pp. 33\u201334. Springer, Heidelberg (1996)"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/BFb0054154","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"A. Chan","year":"1998","unstructured":"Chan, A., Frankel, Y., Tsiounis, Y.: Easy Come - Easy Go Divisible Cash. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 561\u2013575. Springer, Heidelberg (1998)"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/0-387-34799-2_25","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"D. Chaum","year":"1990","unstructured":"Chaum, D., Fiat, A., Naor, M.: Untraceable Electronic Cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 319\u2013327. Springer, Heidelberg (1990)"},{"unstructured":"Cox, B., Tygar, J.D., Sirbu, M.: NetBill Security and Transaction Protocol. In: Proceedings of the First Usenix Workshop on Electronic Commerce, New York (July 1995)","key":"12_CR8"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/BFb0053446","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"T. Eng","year":"1994","unstructured":"Eng, T., Okamoto, T.: Single-Term Divisible Electronic Coins. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 306\u2013319. Springer, Heidelberg (1994)"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","first-page":"292","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"N. Ferguson","year":"1993","unstructured":"Ferguson, N.: Extensions of Single Term Coins. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 292\u2013301. Springer, Heidelberg (1993)"},{"key":"12_CR11","series-title":"E. Foo, C. Boyd","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/BFb0055476","volume-title":"Financial Cryptography","author":"E. Foo","year":"1998","unstructured":"Foo, E., Boyd, C.: A Payment Scheme Using Vouchers. In: Hirschfeld, R. (ed.) FC 1998. E. Foo, C. Boyd, vol.\u00a01465, pp. 103\u2013121. Springer, Heidelberg (1998)"},{"issue":"5","key":"12_CR12","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/32.502223","volume":"22","author":"M.K. Franklin","year":"1996","unstructured":"Franklin, M.K., Reiter, M.K.: The Design and Implementation of a Secure Auction Service. IEEE Transactions on Software Engineering\u00a022(5), 302\u2013312 (1996)","journal-title":"IEEE Transactions on Software Engineering"},{"unstructured":"Freier, A.O., Karlton, P.L., Kocher, P.C.: The SSL Protocol Version 3.0. (1996), \n                    \n                      http:\/\/www.netscape.com\/eng\/ssl3\/","key":"12_CR13"},{"unstructured":"VISA\/MasterCard International. Secure Electronic Transaction (SET) Specification Book 1: Business Description (1997), \n                    \n                      http:\/\/www.setco.org\/set_specifications.html","key":"12_CR14"},{"unstructured":"VISA\/MasterCard International. Secure Electronic Transaction (SET) Specification Book 2: Programmer\u2019s Guide (1997), \n                    \n                      http:\/\/www.setco.org\/set_specifications.html","key":"12_CR15"},{"unstructured":"VISA\/MasterCard International. Secure Electronic Transaction (SET) Specification Book 3: Formal Protocol Definition (1997), \n                    \n                      http:\/\/www.setco.org\/set_specifications.html","key":"12_CR16"},{"key":"12_CR17","volume-title":"Proceedings of the Fourth ACM Conference on Computer and Communications Security","author":"J. Kelsey","year":"1997","unstructured":"Kelsey, J., Schneier, B.: Conditional purchase orders. In: Proceedings of the Fourth ACM Conference on Computer and Communications Security. ACM Press, New York (1997)"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/3-540-49248-8_16","volume-title":"State of the Art in Applied Cryptography","author":"B. Schoenmakers","year":"1998","unstructured":"Schoenmakers, B.: Security Aspects of the EcashTM Payment System. In: Preneel, B., Rijmen, V. (eds.) State of the Art in Applied Cryptography. LNCS, vol.\u00a01528, p. 338. Springer, Heidelberg (1998)"},{"key":"12_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/3-540-48390-X_17","volume-title":"Financial Cryptography","author":"S. Stubblebine","year":"1999","unstructured":"Stubblebine, S., Syverson, P.: Fair On-line Auctions without Special Trusted Parties. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol.\u00a01648, p. 230. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10718964_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T03:22:49Z","timestamp":1552879369000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10718964_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540677420","9783540450306"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/10718964_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}