{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:50:52Z","timestamp":1725490252708},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540663621"},{"type":"electronic","value":"9783540483908"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48390-x_16","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T11:10:11Z","timestamp":1188299411000},"page":"212-229","source":"Crossref","is-referenced-by-count":5,"title":["Anonymous Investing: Hiding the Identities of Stockholders"],"prefix":"10.1007","author":[{"given":"Philip","family":"MacKenzie","sequence":"first","affiliation":[]},{"given":"Jeffrey","family":"Sorensen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,8,30]]},"reference":[{"key":"16_CR1","series-title":"Lect Notes Comput Sci","first-page":"302","volume-title":"Advances in Cryptology-CRYPTO\u2019 93","author":"S. Brands","year":"1993","unstructured":"S. Brands Untraceable off-line cash in wallet with observers (extended abstract). In Advances in Cryptology-CRYPTO\u2019 93, volume 773 of Lecture Notes in Computer Science, pages 302\u2013318. Springer-Verlag, 22-26 Aug. 1993."},{"key":"16_CR2","unstructured":"E. Brickell, P. Gemmell, and D. Kravitz Trustee-based tracing extensions to anonymous cash and the making of anonymous change. In Proceedings of the Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 457\u2013466, San Francisco, California, 22-24 Jan. 1995."},{"issue":"1","key":"16_CR3","doi-asserted-by":"crossref","first-page":"69","DOI":"10.3233\/JCS-1997-5104","volume":"5","author":"J. Camenisch","year":"1997","unstructured":"J. Camenisch, U. Maurer, and M. Stadler Digital payment systems with passive anonymity-revoking trustees. Journal of Computer Security, 5(1):69\u201389, 1997.","journal-title":"Journal of Computer Security"},{"key":"16_CR4","unstructured":"J. Camp, M. Harkavy, J. Tygar, and B. Yee Anonymous atomic transactions. In Proceedings of the Second Usenix Workshop on Electronic Commerce, page (n\/a), 1996."},{"issue":"10","key":"16_CR5","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"D. Chaum Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030\u20131044, 1985.","journal-title":"Communications of the ACM"},{"issue":"1","key":"16_CR6","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D. Chaum","year":"1988","unstructured":"D. Chaum The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, 1(1):65\u201375, 1988.","journal-title":"Journal of Cryptology"},{"key":"16_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1007\/3-540-46877-3_41","volume-title":"Advances in Cryptology-EUROCRYPT 90","author":"D. Chaum","year":"1991","unstructured":"D. Chaum Zero-knowledge undeniable signatures (extended abstract). In Advances in Cryptology-EUROCRYPT 90, volume 473 of Lecture Notes in Computer Science, pages 458\u2013464. Springer-Verlag, 1991, 21-24 May 1990."},{"key":"16_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/0-387-34799-2_25","volume-title":"Advances in Cryptology-CRYPTO\u2019 88","author":"D. Chaum","year":"1990","unstructured":"D. Chaum, A. Fiat, and M. Naor Untraceable electronic cash (extended abstract). In Advances in Cryptology-CRYPTO\u2019 88, volume 403 of Lecture Notes in Computer Science, pages 319\u2013327. Springer-Verlag, 1990, 21-25 Aug. 1988."},{"key":"16_CR9","unstructured":"D.L. Chaum Silo watching. In Advances in Cryptology: A Report on CRYPTO 81, pages 138\u2013139. Department of Electrical and Computer Engineering, U. C. Santa Barbara, 24-26 Aug. 1981. ECE Report 82-04, 1982."},{"key":"16_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5","volume-title":"Advances in Cryptology-CRYPTO\u2019 96","author":"N. Koblitz","year":"1996","unstructured":"Advances in Cryptology\u2014CRYPTO\u2019 96, volume 1109 of Lecture Notes in Computer Science. Springer-Verlag, 18-22 Aug. 1996."},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"G. Davida, Y. Frankel, Y. Tsiounis, and M. Yung Anonymity control in e-cash systems. In Hirschfeld [16], pages 1\u201316.","DOI":"10.1007\/3-540-63594-7_63"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"A. de Solages and J. Traor\u00e9 An efficient fair off-line electronic cash system with extensions to checks and wallets with observers. In Hirschfeld [17], pages 275\u2013295.","DOI":"10.1007\/BFb0055489"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Y. Frankel, Y. Tsiounis, and M. Yung \u201cIndirect discourse proofs\u201d: Achieving efficient fair off-line E-cash. In Kim and Matsumoto [22], pages 286\u2013300.","DOI":"10.1007\/BFb0034855"},{"key":"16_CR14","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-ASIACRYPT\u2019 98","author":"Y. Frankel","year":"1998","unstructured":"Y. Frankel, Y. Tsiounnis, and M. Yung Fair off-line e-cash made easy. In Advances in Cryptology-ASIACRYPT\u2019 98, Lecture Notes in Computer Science, page to appear. Springer-Verlag, Nov. 1998."},{"key":"16_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/3-540-56939-1_78","volume-title":"Proceedings of the Twentieth International Colloquium on Automata, Languages and Programming","author":"M. Franklin","year":"1993","unstructured":"M. Franklin and M. Yung Secure and efficient off-line digital money. In Proceedings of the Twentieth International Colloquium on Automata, Languages and Programming, volume 700 of Lecture Notes in Computer Science, pages 265\u2013276, Lund, Sweden, July 1993. Springer-Verlag."},{"key":"16_CR16","series-title":"Lect Notes Comput Sci","volume-title":"Financial Cryptography: First International Conference, FC\u2019 97","year":"1997","unstructured":"R. Hirschfeld, editor Financial Cryptography: First International Conference, FC\u2019 97, volume 1318 of Lecture Notes in Computer Science, Anguilla, BritishWest Indies, 24-28 Feb. 1997. Springer-Verlag."},{"key":"16_CR17","series-title":"Lect Notes Comput Sci","volume-title":"Financial Cryptography: Second International Conference, FC\u2019 98","year":"1998","unstructured":"R. Hirschfeld, editor Financial Cryptography: Second International Conference, FC\u2019 98, volume 1465 of Lecture Notes in Computer Science, Anguilla, BritishWest Indies, June 1998. Springer-Verlag."},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"M. Jakobsson and J. M\u00fcller Improved magic ink signatures using hints. In Financial Cryptography: Third International Conference, FC\u2019 98, Anguilla, British West Indies, 1999. Springer-Verlag.","DOI":"10.1007\/3-540-48390-X_19"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"M. Jakobsson and M. Yung Revokable and versatile electronic money. In Proceedings of the Third ACM Conference on Computer and Communications Security, pages 76\u201387, 1996.","DOI":"10.1145\/238168.238191"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"M. Jakobsson and M. Yung Applying anti-trust policies to increase trust in a versatile e-money system. In Hirschfeld [16], pages 217\u2013238.","DOI":"10.1007\/3-540-63594-7_80"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"M. Jakobsson and M. Yung Applying anti-trust policies to increase trust in a versatile e-money system. In Hirschfeld [16], pages 217\u2013238.","DOI":"10.1007\/3-540-63594-7_80"},{"key":"16_CR22","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0034829","volume-title":"Advances in Cryptology-ASIACRYPT\u2019 96","author":"K. Kim","year":"1996","unstructured":"K. Kim and T. Matsumoto, editors Advances in Cryptology-ASIACRYPT\u2019 96, volume 1163 of Lecture Notes in Computer Science, Kyongju, Korea, 3-7 Nov. 1996. Springer-Verlag."},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"G. Medvinsky and C.B. Neuman Netcash: a design for practical electonic currency on the internet. In Proceedings of the First ACM Conference on Computer and Communications Security, pages 102\u2013106, Fairfax, VA, 1993.","DOI":"10.1145\/168588.168601"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"D. M\u2019Ra\u00efhi Cost-effective payment schemes with privacy regulation. In Kim and Matsumoto [22], pages 266\u2013275.","DOI":"10.1007\/BFb0034853"},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"D. M\u2019Raihi and D. Pointcheval Distributed trustees and revocability: A framework for internet payment. In Hirschfeld [17], pages 28\u201342.","DOI":"10.1007\/BFb0055471"},{"issue":"1","key":"16_CR26","first-page":"56","volume":"E81-A","author":"K. Oishi","year":"1998","unstructured":"K. Oishi, M. Mambo, and E. Okamoto Anonymous public key certificates and the applications. IEICE Transactions on Fundamentals of Electonics, Communications, and Computer Sciences, E81-A(1):56\u201364, Jan. 1998.","journal-title":"IEICE Transactions on Fundamentals of Electonics, Communications, and Computer Sciences"},{"issue":"2","key":"16_CR27","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/0167-4048(87)90087-3","volume":"6","author":"A. Pfitzmann","year":"1987","unstructured":"A. Pfitzmann and M. Waidner Networks without user observability. Computers & Security, 6(2):158\u2013166, 1987.","journal-title":"Computers & Security"},{"issue":"1","key":"16_CR28","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1145\/253145.253282","volume":"15","author":"B. Pfitzmann","year":"1997","unstructured":"B. Pfitzmann and M. Waidner Strong loss tolerance of electronic coin systems. ACM Transactions on Computer Systems, 15(1):194\u2013213, Feb. 1997.","journal-title":"ACM Transactions on Computer Systems"},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"C. Rackoff and D.R. Simon Cryptographic defense against traffic analysis. In Proceedings of the Twenty-Fifth Annual ACM Symposium on the Theory of Computing, pages 672\u2013681, San Diego, California, 16-18 May 1993.","DOI":"10.1145\/167088.167260"},{"key":"16_CR30","doi-asserted-by":"crossref","unstructured":"C. Radu, R. Govaerts, and J. Vandewalle Efficient electronic cash with restricted privacy. In Hirschfeld [16], pages 57\u201369.","DOI":"10.1007\/3-540-63594-7_67"},{"key":"16_CR31","doi-asserted-by":"crossref","unstructured":"R.L. Rivest Perspectives on financial cryptography. In Hirschfeld [16], pages 145\u2013149.","DOI":"10.1007\/3-540-63594-7_74"},{"key":"16_CR32","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"B. Schneier. Applied Cryptography. John Wiley & Sons, Inc., New York, second edition, 1996.","edition":"second edition"},{"key":"16_CR33","doi-asserted-by":"crossref","unstructured":"D.R. Simon Anonymous communication and anonymous cash. In CRYPTO\u201996 [10], pages 61\u201373.","DOI":"10.1007\/3-540-68697-5_5"},{"key":"16_CR34","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/3-540-49264-X_17","volume-title":"Advances in Cryptology-EUROCRYPT 95","author":"M. Stadler","year":"1995","unstructured":"M. Stadler, J.-M. Piveteau, and J. Camenisch Fair blind signatures. In Advances in Cryptology-EUROCRYPT 95, volume 921 of Lecture Notes in Computer Science, pages 209\u2013219. Springer-Verlag, 21-25 May 1995."},{"key":"16_CR35","series-title":"Lect Notes Comput Sci","first-page":"153","volume-title":"Advances in Cryptology-ASIACRYPT\u2019 94","author":"Y. Yacobi","year":"1994","unstructured":"Y. Yacobi Efficient electronic money (extended abstract). In J. Pieprzyk and R. Safavi-Naini, editors, Advances in Cryptology-ASIACRYPT\u2019 94, volume 917 of Lecture Notes in Computer Science, pages 153\u2013163, Wollongong, Australia, 28 Nov. 1 Dec. 1994. Springer-Verlag."}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48390-X_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T13:12:47Z","timestamp":1556802767000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48390-X_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540663621","9783540483908"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/3-540-48390-x_16","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}