{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:26:24Z","timestamp":1753921584588},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540663621"},{"type":"electronic","value":"9783540483908"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48390-x_1","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T15:10:11Z","timestamp":1188313811000},"page":"1-16","source":"Crossref","is-referenced-by-count":21,"title":["Experimenting with Electronic Commerce on the PalmPilot"],"prefix":"10.1007","author":[{"given":"Neil","family":"Daswani","sequence":"first","affiliation":[]},{"given":"Dan","family":"Boneh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,8,30]]},"reference":[{"key":"1_CR1","unstructured":"3Com Corporation, http:\/\/www.3com.com"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"R. Anderson, C. Manifavas, C. Sutherland, \u201cNetcard-a practical electronic cash system\u201d, in Fourth Cambridge Workshop on Security Protocols.","DOI":"10.1007\/3-540-62494-5_4"},{"key":"1_CR3","unstructured":"R. Anderson, M. Kuhn, \u201cTamper resistance-a cautionary note\u201d, In 2nd USENIX Workshop on electronic commerce, 1996, pp. 1\u201311."},{"key":"1_CR4","unstructured":"Certicom Co., http:\/\/www.certicom.com"},{"key":"1_CR5","unstructured":"B. Cox, D. Tygar, M. Sirbu, \u201cNetBill security and transaction protocol\u201d, http:\/\/www.ini.cmu.edu\/netbill\/home.html ."},{"key":"1_CR6","unstructured":"CyberCash, http:\/\/www.cybercash.com"},{"key":"1_CR7","unstructured":"N. Daswani, D. Boneh, H. Garcia-Molina, S. Ketchpel, A. Paepcke \u201cSWAPEROO: A Simple Wallet Architecture for Payments, Exchanges, Refunds, and Other Operations\u201d, Proceedings of the Third USENIX Workshop on Electronic Commerce, 1998."},{"key":"1_CR8","unstructured":"DigiCash, http:\/\/www.digicash.com"},{"key":"1_CR9","unstructured":"Financial applications for the PalmPilot, http:\/\/www.pilotzone.com\/prod business.html"},{"key":"1_CR10","unstructured":"A. Glass, \u201cCould the smartcard be dumb\u201d, Proceedings of Eurocrypt\u2019 86, 1986."},{"key":"1_CR11","unstructured":"I. Goldberg, pilotSSLeay-2.01, http:\/\/www.isaac.cs.berkeley.edu\/pilot\/"},{"key":"1_CR12","unstructured":"R. Hauser, M. Steiner, M. Waidner, \u201cMicro-payments based on iKP\u201d, In 14th Wolrd-wide congress on computer and communication security protection, 1996."},{"key":"1_CR13","unstructured":"S. Jarecki, A. Odlyzko, \u201cAn efficient micropayment system based on probabilistic polling\u201d, Proc. Financial Cryptography\u2019 97."},{"key":"1_CR14","unstructured":"C. Jutla, M. Yung, \u201cPaytree: amortized signature for flexible micropayments\u201d, In 2nd USENIX Workshop on electronic commerce, 1996, pp. 213\u2013221."},{"issue":"11","key":"1_CR15","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"L. Lamport, \u201cPassword authentication with insecure communication\u201d, Communications of the ACM, vol. 24(11), 1981, pp. 770\u2013771.","journal-title":"Communications of the ACM"},{"key":"1_CR16","unstructured":"R. Lipton, R. Ostrovsky, \u201cMicro-Payments via efficient coin flipping\u201d, Proc. Financial Cryptography\u2019 98."},{"key":"1_CR17","unstructured":"M. Manasse, \u201cThe Millicent protocols for electronic commerce\u201d, Proc. of the 1st USENIX workshop on Electronic Commerce."},{"key":"1_CR18","unstructured":"Mondex International, http:\/\/www.mondex.com"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"T. Pederson, \u201cElectronic payments of small amounts\u201d, Tech. Report, DAIMI PB-495, Aarhus University, Computer Science Dept., Aug. 1995.","DOI":"10.7146\/dpb.v24i495.7023"},{"key":"1_CR20","unstructured":"R. Rivest, \u201cLottery tickets as Micro-Cash\u201d, Financial Cryptography\u2019 97."},{"key":"1_CR21","unstructured":"R. Rivest, A. Shamir, \u201cPayWord and MicroMint\u201d, CryptoBytes, Vol. 2, No. 1, pp. 7\u201311. Available from http:\/\/www.rsa.com"},{"key":"1_CR22","unstructured":"Security applications for the PalmPilot, http:\/\/www.pilotzone.com\/util security.html"},{"key":"1_CR23","unstructured":"Secure Electronic Transactions. http:\/\/www.setco.org"},{"key":"1_CR24","unstructured":"Y. Yacobi, \u201cOn the continuum between on-line and off-line e-cash systems-I\u201d, Proc. Financial Cryptography\u2019 97."},{"key":"1_CR25","unstructured":"Windows CE 2.0, http:\/\/www.microsoft.com\/windowsce\/"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48390-X_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T17:12:56Z","timestamp":1556817176000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48390-X_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540663621","9783540483908"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/3-540-48390-x_1","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}