{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:41:33Z","timestamp":1725486093618},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540679813"},{"type":"electronic","value":"9783540444633"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44463-7_22","type":"book-chapter","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T14:52:58Z","timestamp":1181227978000},"page":"253-265","source":"Crossref","is-referenced-by-count":7,"title":["Loyalty Program Scheme for Anonymous Payment Systems"],"prefix":"10.1007","author":[{"given":"Arrianto Mukti","family":"Wibowo","sequence":"first","affiliation":[]},{"given":"Kwok Yan","family":"Lam","sequence":"additional","affiliation":[]},{"given":"Gary S. H.","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,12,14]]},"reference":[{"key":"22_CR1","unstructured":"Jo Ann S. Barefoot. Privacy under scrutiny. In Banking Strategies, Nov\/Dec 1999."},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Ruth N. Bolton, P. K. Kannan and Matthew D. Bramlett. Implications of loyalty program membership and service experiences for customer retention and value. In Journal of Academy of Marketing Science. Greenvale, Winter 2000.","DOI":"10.1177\/0092070300281009"},{"key":"22_CR3","unstructured":"Stefan Brands. An efficient off-line electronic cash system based on the representation problem. Report CS-R9323, Centrum voor Wiskunde en Informatica, March 1993."},{"key":"22_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34799-2_25","volume-title":"Advances in Cryptology \u2014 proceedings of CRYPTO 88","author":"D. Chaum","year":"1990","unstructured":"David Chaum, Amos Fiat and Moni Naor. Untraceable electronic cash. In Advances in Cryptology \u2014 proceedings of CRYPTO 88, Lecture Notes in Computer Science 403, Springer-Verlag, 1990."},{"key":"22_CR5","volume-title":"Advances in Cryptology \u2014 proceedings of CRYPTO 82","author":"D. Chaum","year":"1983","unstructured":"David Chaum. Blind signatures for untraceable payments. In Advances in Cryptology \u2014 proceedings of CRYPTO 82, Plenum Press, New York, 1983."},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"David Chaum. Achieving Electronic Privacy. In Scientific American, August 1992.","DOI":"10.1038\/scientificamerican0892-96"},{"key":"22_CR7","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 CRYPTO 92","author":"D. Chaum","year":"1993","unstructured":"David Chaum and Torben Pryds Pedersen. Wallet databases with observers. In Advances in Cryptology \u2014 CRYPTO 92. Lecture Notes in Computer Science 740, Springer-Verlag, 1993."},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Jan L. Camenish, Jean-Marc Piveteau and Markus A. Stadler. An Efficient Electronic Payment System Protecting Privacy. In Proceedings of ESORICS\u2019 94. Lecture Notes inComputer Science 875, Springer-Verlag, 1995.","DOI":"10.1007\/3-540-58618-0_65"},{"key":"22_CR9","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 94","author":"T. Eng","year":"1995","unstructured":"Tony Eng and Tatsuaki Okamoto. Single term divisible electronic coins. In Advances in Cryptology \u2014 EUROCRYPT 94. Lecture Notes in Computer Science 960, Springer-Verlag, 1995."},{"key":"22_CR10","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 93","author":"N. Ferguson","year":"1994","unstructured":"Niels Ferguson. Single term off-line coins. In Advances in Cryptology \u2014 EUROCRYPT 93, Lecture Notes in Computer Science 765, Springer-Verlag, 1994."},{"key":"22_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_25","volume-title":"Advances in Cryptology \u2014 CRYPTO 93","author":"N. Ferguson","year":"1994","unstructured":"Niels Ferguson. Extensions of single term coins. In Advances in Cryptology \u2014 CRYPTO 93, Lecture Notes in Computer Science 773, Springer-Verlag, 1994."},{"key":"22_CR12","unstructured":"GVU WWW Surveying Team, Georgia Institute of Technology, GVU\u2019s 8 th WWW User Survey. Available at http:\/\/www.gvu.gatech.edu\/user_surveys\/ , 1997."},{"key":"22_CR13","volume-title":"Customer Service: A Practical Approach","author":"E. K. Harris","year":"1996","unstructured":"Elaine K. Harris. Customer Service: A Practical Approach, Prentice Hall, Upper Saddle River, 1996."},{"key":"22_CR14","volume-title":"Computerization and Controversy: Value Conflicts and Social Choices","author":"D. Hatch","year":"1996","unstructured":"Denison Hatch. Privacy: how much data do direct marketers really need?. In Rob Kling (ed)., Computerization and Controversy: Value Conflicts and Social Choices, 2nd edition. Academic Press, San Diego, 1996.","edition":"2nd edition"},{"volume-title":"Oxford Advanced Learner\u2019s Dictionary of Current English","year":"1992","key":"22_CR15","unstructured":"A.S. Hornby and A.P. Cowie (editor), Oxford Advanced Learner\u2019s Dictionary of Current English, Oxford University Press, Oxford, 1992"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Stephen H. Low, Nicholas F. Maxemchuk and Sanjoy Paul. Anonymous Credit Cards. In Proceedings of the 2 nd ACM Conference on Computer and Communication Security. 1994.","DOI":"10.1145\/191177.191199"},{"key":"22_CR17","series-title":"Lect Notes Comput Sci","volume-title":"Financial Cryptography, 2nd International Conference, FC 98","author":"A. Lysyanskaya","year":"1998","unstructured":"Anna Lysyanskaya and Zulfikar Ramzan. Group blind digital signatures: A scalable solution to electronic cash. In Financial Cryptography, 2nd International Conference, FC 98, Lecture Notes in Computer Science 1465, Springer, 1998."},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Gerrard Macintosh and Lawrence S. Lockshin. Retail relationship and store loyalty: A multi-level perspective. In International Journal of Research in Marketing, vol. 14, 1997.","DOI":"10.1016\/S0167-8116(97)00030-X"},{"key":"22_CR19","volume-title":"Handbook of Applied Cryptography","author":"Alfred_J. Menezes","year":"1997","unstructured":"Alfred_J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography, CRC Press, Boca Raton, 1997."},{"key":"22_CR20","unstructured":"Netscape Communications Security, Cookies and Privacy FAQ, available at http:\/\/www.cookiecentral.com\/n_cookie_faq.htm , 1997"},{"key":"22_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44750-4_35","volume-title":"Advances in Cryptology \u2014 CRYPTO 95","author":"T. Okamoto","year":"1995","unstructured":"Tatsuaki Okamoto. An efficient divisible electronic cash scheme. In Advances in Cryptology \u2014 CRYPTO 95. Lecture Notes in Computer Science 963, Springer-Verlag, 1995."},{"key":"22_CR22","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 CRYPTO 91","author":"T. Okamoto","year":"1992","unstructured":"Tatsuaki Okamoto and Kazuo Ohta. Universal electronic cash. In Advances in Cryptology \u2014 CRYPTO 91. Lecture Notes in Computer Science 576, Springer-Verlag, 1992."},{"key":"22_CR23","unstructured":"S. Pearson. How to achieve return on investment from customer loyalty \u2014 part 1. In Journal of Targeting, Measurement and Analysis for Marketing, vol. 3 no. 1, 1994."},{"key":"22_CR24","series-title":"Lect Notes Comput Sci","volume-title":"Financial Cryptography, 1st International Conference, FC 97","author":"C. Radu","year":"1997","unstructured":"Cristian Radu, Ren\u00e9 Govaerts and Joss Vandewalle. Efficient electronic cash with restricted privacy. In Financial Cryptography, 1 st International Conference, FC 97, Lecture Notes in Computer Science 1318, Springer, 1997."},{"key":"22_CR25","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition","author":"B. Schneier","year":"1996","unstructured":"Bruce Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition, John Wiley & Sons. Inc., New York, 1996."},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Byron Sharp and Anne Sharp. Loyalty programs and their impact on repeat-purchase loyalty patterns. In International Journal of Research in Marketing, vol. 14, 1997.","DOI":"10.1016\/S0167-8116(97)00022-0"},{"key":"22_CR27","unstructured":"Yiannis S. Tsiounis. Efficient electronic cash: new notions and techniques. Ph.D. thesis. Department of Computer Science, Northeastern University, 1997."},{"key":"22_CR28","unstructured":"David Whaler, The Unofficial Cookie FAQ, available at http\/\/www.cookiecentral.com\/faq\/, 1999."},{"key":"22_CR29","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0000431","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 94","author":"Y. Yacobi","year":"1995","unstructured":"Yacov Yacobi. Efficient electronic money. In Advances in Cryptology \u2014 ASIACRYPT 94. Lecture Notes in Computer Science 917, Springer-Verlag, 1995."}],"container-title":["Lecture Notes in Computer Science","Electronic Commerce and Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44463-7_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T16:27:41Z","timestamp":1556468861000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44463-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540679813","9783540444633"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/3-540-44463-7_22","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}