{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:55:27Z","timestamp":1725490527956},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540414162"},{"type":"electronic","value":"9783540444565"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44456-4_12","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T09:47:02Z","timestamp":1188294422000},"page":"149-163","source":"Crossref","is-referenced-by-count":5,"title":["Linkability in Practical Electronic Cash Design"],"prefix":"10.1007","author":[{"given":"Greg","family":"Maitland","sequence":"first","affiliation":[]},{"given":"Jason","family":"Reid","sequence":"additional","affiliation":[]},{"given":"Ernest","family":"Foo","sequence":"additional","affiliation":[]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[]},{"given":"Ed","family":"Dawson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,28]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"R. J. Anderson and M. Kuhn. Low cost attacks on tamper resistant devices. Security Protocols, 5th International Workshop Proceedings, pages 125\u2013135. Springer-Verlag, 1998.","DOI":"10.1007\/BFb0028165"},{"key":"12_CR2","unstructured":"R. Anderson and M. Kuhn. Tamper resistance-a cautionary note. Second USENIX Workshop on Electronic Commerce, pages 1\u201311, 1996. USENIX."},{"key":"12_CR3","unstructured":"S. Brands. An efficient off-line electronic cash system based on the representation problem. Technical Report CS-R9323, Centrum voor Wiskunde en Informatica (CWI), March 1993."},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"S. Brands. Untraceable off-line cash in wallets with observers. Advances in Cryptology-CRYPTO\u201993, pages 302\u2013318. Springer-Verlag, 1993.","DOI":"10.1007\/3-540-48329-2_26"},{"key":"12_CR5","unstructured":"E. Brickell, P. Gemmell, and D. Kravitz. Trustee-based tracing extensions to anonymous cash and the making of anonymous change. Proceedings of the Sixth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA\u201995), pages 457\u2013466, 1995."},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"A. Chan, Y. Frankel, and Y. Tsiounis. Easy come \u2014 easy go divisible cash. Advances in Cryptology-EUROCRYPT\u201998, pages 561\u2013576, Springer-Verlag, 1998.","DOI":"10.1007\/BFb0054154"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"D. Chaum and T. Pedersen. Wallet databases with observers. Advances in Cryptology-CRYPTO\u201992, pages 89\u2013105. Springer-Verlag, 1993.","DOI":"10.1007\/3-540-48071-4_7"},{"key":"12_CR8","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/978-1-4757-0602-4_18","volume-title":"Advances in Cryptology-CRYPTO\u201982","author":"D. Chaum","year":"1983","unstructured":"D. Chaum. Blind signatures for untraceable payments. Advances in Cryptology-CRYPTO\u201982, pages 199\u2013203. Plenum Press, New York and London, 1983, 23\u201325 August 1982."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"T. Eng and T. Okamoto. Single-term divisible electronic coins. Advances in Cryptology-EUROCRYPT\u201994, pages 306\u2013319. Springer-Verlag, 1995.","DOI":"10.1007\/BFb0053446"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"M. Jakobsson. A practical mix. Advances in Cryptology-EUROCRYPT\u201998, pages 448\u2013461. Springer-Verlag, 1998.","DOI":"10.1007\/BFb0054145"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"M. Jakobsson and M. Yung. Revokable and versatile electronic money. 3rd ACM Conference on Computer and Communications Security, pages 76\u201387, 1996. ACM Press.","DOI":"10.1145\/238168.238191"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"T. Okamoto and K. Ohta. Disposable zero-knowledge authentications and their applications to untraceable electronic cash. Advances in Cryptology-CRYPTO\u201989, pages 481\u2013496, Springer-Verlag, 1990.","DOI":"10.1007\/0-387-34805-0_43"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"T. Okamoto and K. Ohta. Universal electronic cash. Advances in Cryptology-CRYPTO\u201991, pages 324\u2013337, Springer-Verlag, 1992.","DOI":"10.1007\/3-540-46766-1_27"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"T. Okamoto. An efficient divisible electronic cash scheme. Advances in Cryptology-CRYPTO\u201995, pages 438\u2013451. Springer-Verlag, 1995.","DOI":"10.1007\/3-540-44750-4_35"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"B. Pfitzmann and M. Waidner. How to break and repair a \u201cprovably secure\u201d untraceable payment system. Advances in Cryptology-CRYPTO\u201991, pages 338\u2013350, Springer-Verlag, 1992.","DOI":"10.1007\/3-540-46766-1_28"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"C. Radu, R. Govaerts, and J. Vandewalle. Efficient electronic cash with restricted privacy. Financial Cryptography: First International Conference, FC\u2019 97, pages 57\u201369, 1997. Springer-Verlag.","DOI":"10.1007\/3-540-63594-7_67"},{"key":"12_CR17","unstructured":"M. K. Reiter and A. D. Rubin. Crowds: Anonymity for web transactions. Technical Report 97\u201315, DIMACS, April 1997."},{"key":"12_CR18","unstructured":"Y. Tsiounis. Efficient Electronic Cash: New Notions and Techniques. PhD thesis, Northeastern University Boston, 1997."},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"A. C. Yao. Protocols for secure computations. 23rd IEEE Symposium on Foundations of Computer Science, pages 160\u2013164. IEEE Press, 1982.","DOI":"10.1109\/SFCS.1982.38"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44456-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T13:05:28Z","timestamp":1556802328000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44456-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414162","9783540444565"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-44456-4_12","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}