{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T06:28:34Z","timestamp":1751869714861},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540663621"},{"type":"electronic","value":"9783540483908"}],"license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48390-x_5","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T11:10:11Z","timestamp":1188299411000},"page":"62-71","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Risk Management for E-Cash Systems with Partial Real-Time Audit"],"prefix":"10.1007","author":[{"given":"Yacov","family":"Yacobi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,8,30]]},"reference":[{"key":"5_CR1","unstructured":"N. Alon, J.H. Spencer, and P. Erdos The Probabilistic Method, Wiley Interscience, ISBN 0-471-53588-5"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"D. Chaum Achieving Electronic Privacy Scientific American, August 1992, pp. 96\u2013101.","DOI":"10.1038\/scientificamerican0892-96"},{"key":"5_CR3","unstructured":"Chaum Fiat and Naor Untraceable Electronic Cash, Proc. Crypto 1988."},{"key":"5_CR4","unstructured":"S. Even, O. Goldreich, Y. Yacobi: Electronic Wallet, Crypto\u201983 (See also the Zurich\u201994 Seminar)."},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"M Franklin and M. Yung Secure and efficient off-line digital money, Proc. 20th ICALP 1993","DOI":"10.1007\/3-540-56939-1_78"},{"key":"5_CR6","unstructured":"E. Gabber and A. Silberschatz: Agora: A Minimal Distributed Protocol for Electronic Commerce, USENIX Workshop on E-Commerce, Oakland CA, Nov. 1996."},{"key":"5_CR7","unstructured":"S. Jarecki and A.M. Odlyzko:An efficient micropayment system based on probabilistic polling, Proc. Financial Cryptography-97."},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"R.C. Merkle: Protocols for Public Key Cryptosystems, Proc. of 1980 Symp. on Security and Privacy, IEEE Computer Society, pp. 122\u2013133 (April 1980).","DOI":"10.1109\/SP.1980.10006"},{"key":"5_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1007\/3-540-44750-4","volume-title":"Proc. Crypto\u201995","author":"D. Coppersmith","year":"1995","unstructured":"T. Okamoto:`An Efficient Divisible Electronic Cash Scheme, Proc. Crypto\u201995, Springer Verlag LNCS 963, pp. 438\u2013451."},{"key":"5_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1007\/0-387-34805-0_43","volume-title":"Proc. Crypto\u201989","author":"T. Okamoto","year":"1990","unstructured":"T. Okamoto and K. Ohta: Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash, Proc. Crypto\u201989, Springer-Verlag LNCS 435, pp. 481\u2013496"},{"key":"5_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1007\/3-540-46766-1_27","volume-title":"Proc. Crypto\u201990","author":"T. Okamoto","year":"1992","unstructured":"T. Okamoto and K. Ohta: Universal Electronic Cash, Proc. Crypto\u201990, Springer-Verlag LNCS 576, pp. 324\u2013337"},{"key":"5_CR12","series-title":"Lect Notes Comput Sci","first-page":"306","volume-title":"Financial Cryptography 97","author":"R.L. Rivest","year":"1997","unstructured":"R.L. Rivest: Electronic Lottery Tickets as Micropayments Financial Cryptography 97, Springer Verlag LNCS 1318, pp. 306\u2013314, Rafael Hirschfeld (Ed.)"},{"key":"5_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/3-540-68697-5_5","volume-title":"Proc. Crypto\u201996","author":"D.R. Simon","year":"1996","unstructured":"D.R. Simon: Anonymous Communication and Anonymous Cash, Proc. Crypto\u201996, Springer Verlag LNCS 1109, pp 61\u201373."},{"key":"5_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/3-540-62494-5_7","volume-title":"Proc. ARE, 1997","author":"D. Wheeler","year":"1997","unstructured":"D. Wheeler: Transactions Using Bets, Proc. ARE, 1997, LNCS 1189, pp. 89\u201392"},{"key":"5_CR15","series-title":"Lect Notes Comput Sci","first-page":"153","volume-title":"Proc. Asiacrypt\u201994","author":"Y. Yacobi","year":"1995","unstructured":"Y. Yacobi: Efficient E-money, in Proc. Asiacrypt\u201994, Springer Verlag LNCS 917, pp. 153\u2013163."},{"key":"5_CR16","unstructured":"Y. Yacobi: On the Continuum Between On-line and Off-line E-cash Systems-I, Proc. Financial Cryptography-97."}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48390-X_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T10:38:53Z","timestamp":1558262333000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48390-X_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540663621","9783540483908"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-48390-x_5","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]},"assertion":[{"value":"30 August 1999","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}