{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:55:25Z","timestamp":1725490525811},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540414162"},{"type":"electronic","value":"9783540444565"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44456-4_11","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T13:47:02Z","timestamp":1188308822000},"page":"135-148","source":"Crossref","is-referenced-by-count":1,"title":["Weighted One-Way Hash Chain and Its Applications"],"prefix":"10.1007","author":[{"given":"Yen","family":"Sung-Ming","sequence":"first","affiliation":[]},{"given":"Yuliang","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,28]]},"reference":[{"key":"11_CR1","unstructured":"D. O'Mahony, M. Peirce, and H. Tewari, Electronic Payment Systems, Artech House, INC., 1997."},{"issue":"9","key":"11_CR2","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/315762.315769","volume":"42","author":"J. W. Palmer","year":"1999","unstructured":"J. W. Palmer and L. B. Eriksen, \u201cDigital newspapers explore marketing on the Internet,\u201d Commun. of ACM, Vol.42, No.9, pp.33\u201340, 1999.","journal-title":"Commun. of ACM"},{"key":"11_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/3-540-63594-7_87","volume-title":"Electronic lottery tickets as micropayments","author":"R. L. Rivest","year":"1997","unstructured":"R. L. Rivest, \u201cElectronic lottery tickets as micropayments,\u201d Proc. of Financial Cryptography Conference, FC\u2019 97, Lecture Notes in Computer Science, Vol.1318, Springer Verlag, pp.307\u2013314, 1998."},{"key":"11_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/3-540-62494-5_6","volume-title":"PayWord and MicroMint: Two simple micropayment schemes","author":"R. L. Rivest","year":"1997","unstructured":"R. L. Rivest and A. Shamir, \u201cPayWord and MicroMint: Two simple micropayment schemes,\u201d Proc. of Security Protocols Workshop, Lecture Notes in Computer Science, Vol.1189, Springer Verlag, pp.69\u201387, 1997. Also in CryptoBytes, Pressed by RSA Laboratories, Vol.2, No.1, pp.7-11, 1996."},{"key":"11_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/BFb0055870","volume-title":"Authentication and payment in future mobile systems","author":"G. Horn","year":"1998","unstructured":"G. Horn and B. Preneel, \u201cAuthentication and payment in future mobile systems,\u201d Proc. of ESORICS\u2019 98, Lecture Notes in Computer Science, Vol.1485, Springer Verlag, pp.277\u2013293, 1998."},{"key":"11_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1007\/BFb0056997","volume-title":"Secure billing for mobile information services in UMTS","author":"K. M. Martin","year":"1998","unstructured":"K. M. Martin, B. Preneel, C. J. Mitchell, H. J. Hitz, G. Horn, A. Poliakova, and P. Howard, \u201cSecure billing for mobile information services in UMTS,\u201d Proc. of 5th International Conference in Services and Networks, IS&N\u2019 98, Lecture Notes in Computer Science, Vol.1430, Springer Verlag, pp.535\u2013548, 1998."},{"key":"11_CR7","series-title":"Lect Notes Comput Sci","volume-title":"Experimenting with electronic commerce on the PalmPilot","author":"N._Daswani","year":"1999","unstructured":"N._Daswani and D. Boneh, \u201cExperimenting with electronic commerce on the PalmPilot,\u201d Proc. of 3rd Financial Cryptography Conference, FC\u2019 99, Lecture Notes in Computer Science, Vol.1648, Springer Verlag, February 1999."},{"key":"11_CR8","unstructured":"D. O'Mahony, L. Doyle, H. Tewari, and M. Peirce, \u201cNOMAD-An application to provide UMTS telephony services on fixed terminals in COBUCO,\u201d Proc. of 3rd ACTS Mobile Communications Summit, Vol.1, pp.72\u201376, Rhodes, Greece, June 1998."},{"key":"11_CR9","unstructured":"M. Peirce and D. O'Mahony, \u201cMicropayments for mobile networks,\u201d Technical Report of the Dept. of Computer Science, Trinity College Dublin, Ireland, 1999."},{"key":"11_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/3-540-62494-5_4","volume-title":"NetCard-A practical electronic cash system","author":"R. Anderson","year":"1997","unstructured":"R. Anderson, C. Manifavas and C. Sutherland, \u201cNetCard-A practical electronic cash system,\u201d Proc. of Security Protocols Workshop, Lecture Notes in Computer Science, Vol.1189, Springer Verlag, pp.49\u201357, 1997."},{"key":"11_CR11","unstructured":"R. Hauser, M. Steiner, and M. Waidner, \u201cMicro-payments based on iKP,\u201d Proc. of SECURICOM\u2019 96, 14th Worldwide Congress on Computer and Communications Security and Protection, pp.67\u201382, 1996."},{"key":"11_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/3-540-62494-5_5","volume-title":"Electronic payments of small amounts","author":"T. Pedersen","year":"1997","unstructured":"T. Pedersen, \u201cElectronic payments of small amounts,\u201d Proc. of Security Protocols Workshop, Lecture Notes in Computer Science, Vol.1189, Springer Verlag, pp.59\u201368, 1997."},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"S. Glassmann, M. Manasse, M. Abadi, P. Gauthier, and P. Sobalvarro, \u201cThe Millicent protocol for inexpensive electronic commerce,\u201d Proc. of 4th International World Wide Web Conference, Boston, MA, pp.603\u2013618, Dec. 1995.","DOI":"10.1145\/3592626.3592675"},{"key":"11_CR14","unstructured":"S. M. Yen, J. M. Lee, and J. G. Lee, \u201cPayFair: A prepaid Internet micropayment scheme promising customer fairness,\u201d Proc. of International Workshop on Cryptographic Techniques and E-Commerce, CrypTEC\u2019 99, Hong Kong, pp.213\u2013221, 5\u20138 July 1999."},{"issue":"11","key":"11_CR15","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"L. Lamport, \u201cPassword authentication with insecure communication,\u201d Commun. of ACM, Vol.24, No.11, pp.770\u2013772, 1981.","journal-title":"Commun. of ACM"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"N. M. Haller, \u201cThe S\/KEY one-time password system,\u201d Proc. of the ISOC Symposium on Network and Distributed System Security, San Diego, CA, Feb. 1994.","DOI":"10.17487\/rfc1760"},{"key":"11_CR17","unstructured":"M. O. Rabin, \u201cDigital signatures,\u201d Foundations of Secure Computation, Academic Press, pp.155\u2013168, 1978."},{"key":"11_CR18","unstructured":"L. Lamport, \u201cConstructing digital signatures from a one-way function,\u201d Technical Report SRI Intl. CSL 98, 1979."},{"key":"11_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/3-540-48184-2_32","volume-title":"Advances in Cryptology-CRYPTO\u2019 87","author":"R. C. Merkle","year":"1988","unstructured":"R. C. Merkle, \u201cA digital signature based on a conventional encryption function,\u201d Advances in Cryptology-CRYPTO\u2019 87, Lecture Notes in Computer Science, Vol.293, Springer Verlag, pp.369\u2013377, 1988."},{"key":"11_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology-CRYPTO\u2019 89","author":"R. C. Merkle","year":"1990","unstructured":"R. C. Merkle, \u201cA certified digital signature,\u201d Advances in Cryptology-CRYPTO\u2019 89, Lecture Notes in Computer Science, Vol.435, Springer Verlag, pp.218\u2013238, 1990."},{"key":"11_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/0-387-34805-0_24","volume-title":"Advances in Cryptology-CRYPTO\u2019 89","author":"S. Even","year":"1990","unstructured":"S. Even, O. Goldreich, and S. Micali, \u201cOn-line\/off-line digital signatures,\u201d Advances in Cryptology-CRYPTO\u2019 89, Lecture Notes in Computer Science, Vol.435, Springer Verlag, pp.263\u2013275, 1990."},{"key":"11_CR22","unstructured":"A. J. Menezes, P.C. van Oorschot, and S. A. Vanstone, Handbook of applied cryptography, CRC Press, 1997."},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"R. Rivest, \u201cThe MD5 message digest algorithm,\u201d RFC 1321, Apr. 1992.","DOI":"10.17487\/rfc1321"},{"key":"11_CR24","unstructured":"FIPS 180-1, \u201cSecure Hash Standard,\u201d NIST, US Department of Commerce, Washington D.C., April 1995."},{"key":"11_CR25","series-title":"Lect Notes Comput Sci","first-page":"83","volume-title":"Advances in Cryptology-AUSCRYPT\u201992","author":"Y. Zheng","year":"1993","unstructured":"Y. Zheng and J. Pieprzyk and J. Seberry, \u201cHAVAL-a one-way hashing algorithm with variable length of output,\u201d Advances in Cryptology-AUSCRYPT\u201992, Lecture Notes in Computer Science, Vol.718, Springer-Verlag, pp.83\u2013104, 1993."},{"issue":"2","key":"11_CR26","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"R. L. Rivest, A. Shamir, and L. Adleman, \u201cA method for obtaining digital signatures and public-key cryptosystem,\u201d Commun. of ACM, Vol.21, No.2, pp.120\u2013126, 1978.","journal-title":"Commun. of ACM"},{"key":"11_CR27","unstructured":"C. S. Jutla and M. Yung, \u201cPayTree: Amortized-signature for flexible micropayments,\u201d Proc. of Second USENIX Association Workshop on Electronic Commerce, pp.213\u2013221, November 1996."},{"key":"11_CR28","unstructured":"S. M. Yen, L. T. Ho and C.Y. Huang, \u201cInternet micropayment based on unbalanced one-way binary tree,\u201d Proc. of International Workshop on Cryptographic Techniques and E-Commerce, CrypTEC\u2019 99, Hong Kong, pp.155\u2013162, 5\u20138 July 1999."},{"key":"11_CR29","unstructured":"M. Peirce, personal communication, February 2000."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44456-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,17]],"date-time":"2024-02-17T16:41:42Z","timestamp":1708188102000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44456-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414162","9783540444565"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/3-540-44456-4_11","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}