{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T11:40:09Z","timestamp":1736595609911,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540478201"},{"type":"electronic","value":"9783540478232"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11909033_19","type":"book-chapter","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T14:51:56Z","timestamp":1160578316000},"page":"206-215","source":"Crossref","is-referenced-by-count":2,"title":["Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems"],"prefix":"10.1007","author":[{"given":"Seng-Phil","family":"Hong","sequence":"first","affiliation":[]},{"given":"Sungmin","family":"Kang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"A list of privacy surveys surveys, available at: http:\/\/www.privacyexchange.org\/iss\/surveys\/surveys\/..html","key":"19_CR1"},{"key":"19_CR2","first-page":"729","volume-title":"ACM International Conference Proceeding Series","author":"M. Liu","year":"2005","unstructured":"Liu, M., Sun, S., Xing, M.: Study on security based on PKI for e-commerce of statistics information system. In: ACM International Conference Proceeding Series, August 2005, vol.\u00a0113, pp. 729\u2013732. ACM Press, Xi\u2019an, China (2005)"},{"doi-asserted-by":"crossref","unstructured":"Pearlman, L., Welch, V., Foster, I., Kesselman, C., Tuecke, S.: A Community Authorization Service for Group Collaboration Policies for Distributed Systems and Networks. In: Proceedings of the Third International Workshop in 2002, pp. 50\u201359 (2002)","key":"19_CR3","DOI":"10.1109\/POLICY.2002.1011293"},{"issue":"4","key":"19_CR4","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1145\/503339.503343","volume":"4","author":"P. Samarati","year":"2001","unstructured":"Samarati, P., Reiter, M.K., Jajodia, S.: An Authorization Model for a Public Key Management Service. ACM Transactions on Information and System Security\u00a04(4), 453\u2013482 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"1","key":"19_CR5","first-page":"1","volume":"16","author":"C. Ellison","year":"2000","unstructured":"Ellison, C., Schneier, B.: Ten Risks of PKI: What you are not being told about Public Key Infrastructure. Computer Security Journal\u00a016(1), 1\u20137 (2000)","journal-title":"Computer Security Journal"},{"key":"19_CR6","volume-title":"Proceeding of the International Conference on Computer Networks and Mobile Computing","author":"X. Zhang","year":"2003","unstructured":"Zhang, X., Meinel, C., Dulaunoy, A.: A Security Improved OpenSST Prototype Combining with SmartCard. In: Proceeding of the International Conference on Computer Networks and Mobile Computing. IEEE, Los Alamitos (2003)"},{"doi-asserted-by":"crossref","unstructured":"Rexha, B.: Increasing User Privacy in Online Transactions with X.509 v3 Certificate Private Extensions and Smartcards. In: Proceedings of the IEEE International Conference on E-Commerce Technology, Washington, USA (July 2005), pp. 293\u2013300 (2005)","key":"19_CR7","DOI":"10.1109\/ICECT.2005.54"},{"doi-asserted-by":"crossref","unstructured":"Yang, Y., Han, X., Bao, F., Deng, R.H.: A Smart-card Enabled Privacy Preserving E-prescription System. IEEE Transaction on Information Technology in Biomedicine\u00a08(1), 47\u201358","key":"19_CR8","DOI":"10.1109\/TITB.2004.824731"},{"doi-asserted-by":"crossref","unstructured":"Shamir, A.: How to share a secret. Communication of the ACM\u00a022(11), 612\u2013613","key":"19_CR9","DOI":"10.1145\/359168.359176"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/3-540-45682-1_20","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"A. Lysyanskaya","year":"2001","unstructured":"Lysyanskaya, A., Peikert, C.: Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, p. 331. Springer, Heidelberg (2001)"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/3-540-48910-X_7","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"R. Canetti","year":"1999","unstructured":"Canetti, R., Goldwasser, S.: An Efficient Threshold Public-Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 90\u2013106. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11909033_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T11:18:24Z","timestamp":1736594304000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11909033_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540478201","9783540478232"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11909033_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}