{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:19:07Z","timestamp":1725664747508},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540624943"},{"type":"electronic","value":"9783540680475"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-62494-5_5","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T17:37:50Z","timestamp":1330277870000},"page":"59-68","source":"Crossref","is-referenced-by-count":37,"title":["Electronic payments of small amounts"],"prefix":"10.1007","author":[{"given":"Torben P.","family":"Pedersen","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,3]]},"reference":[{"key":"5_CR1","unstructured":"R. Andersonn, H. Manifavas and C. Sutherland. A Practical Electronic Cash System. Manuscript 1995."},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Integrity primitives for Secure Information Systems. Lecture Notes in Computer Science, volume 1007. Eds. A. Bosselaers and B. Preneel.","DOI":"10.1007\/3-540-60640-8"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"J.-P. Boly, A. Bosselars, R. Cramer, R. Michelsen, S. Mj\u00f8lsnes, F. Muller, B. Pfitzmann, P. de Rooij, B. Schoenmakers, M. Schunter, L. Vall\u00e9, and M. Waidner. The ESPRIT Project CAFE \u2014 High Security Digital Payment Systems. In Computer Security \u2014 ESORICS'94, volume 875 of Lecture Notes in Computer Science. Springer-Verlag, 1994.","DOI":"10.1007\/3-540-58618-0_66"},{"key":"5_CR4","unstructured":"J. Bos and D. Chaum. SmartCash: A Practical Electronic Payment System. Technical Report CS-R9035, CWI, August 1990."},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"S. Brands. Untraceable Off-line Cash in Wallet with Observers. In Advances in Cryptology \u2014 proceedings of CRYPTO 93, Lecture Notes in Computer Science, pages 302\u2013318. Springer-Verlag, 1994.","DOI":"10.1007\/3-540-48329-2_26"},{"key":"5_CR6","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/3-540-59175-3_86","volume-title":"LATIN '95: Theoretical Informatics","author":"Stefan Brands","year":"1995","unstructured":"S. Brands. Off-Line Electronic Cash Based on Secret-Key Certificates. In Proceedings of LATIN'95, 1995. Also available as CWI technical report, CS-R9506."},{"key":"5_CR7","first-page":"319","volume-title":"volume 403 of Lecture Notes in Computer Science","author":"D. Chaum","year":"1990","unstructured":"D. Chaum, A. Fiat, and M. Naor. Untraceable Electronic Cash. In Advances in Cryptology\u2014CRYPTO '88, volume 403 of Lecture Notes in Computer Science, pages 319\u2013327, Berlin, 1990. Springer-Verlag."},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"D. Chaum. Achieving Electronic Privacy. Scientific American, pages 96\u2013101, August 1992.","DOI":"10.1038\/scientificamerican0892-96"},{"issue":"6","key":"5_CR9","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman. New Directions in Cryptography. IEEE Trans. Inform. Theory, IT-22(6):644\u2013654, November 1976.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"5_CR10","unstructured":"DigiCash. See http:\/www.digicash.com\/ecash\/."},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"S. Even and O. Goldreich. Electronic Wallet. In Advances in Cryptology \u2014 proceedings of CRYPTO 83, pages 383\u2013386. Plenum Press, 1984.","DOI":"10.1007\/978-1-4684-4730-9_28"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"N. Ferguson. Single Term Off-Line Coins. In Advances in Cryptology \u2014 proceedings of EUROCRYPT 93, Lecture Notes in Computer Science, pages 318\u2013328. Springer-Verlag, 1993.","DOI":"10.1007\/3-540-48285-7_28"},{"key":"5_CR13","unstructured":"R. Hauser, M. Steiner and M. Waidner. Micro-Payments Based on iKP. January 1996"},{"issue":"11","key":"5_CR14","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"L. Lamport. Password Authentication with Insecure Communication. Communications of the ACM, 24(11):770\u2013772, 1981.","journal-title":"Communications of the ACM"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"L. A. Levin. One-Way Function and Pseudorandom Generators. In Proceedings of the 17th Annual ACM Symposium on the Theory of Computing, pages 363\u2013365, 1985.","DOI":"10.1145\/22145.22185"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"R. C. Merkle. A Certified Digital Signature. In Advances in Cryptology \u2014 proceedings of CRYPTO 89, volume 435 of Lecture Notes in Computer Science, pages 218\u2013238. Springer-Verlag, 1990.","DOI":"10.1007\/0-387-34805-0_21"},{"key":"5_CR17","first-page":"324","volume-title":"volume 576 of Lecture Notes in Computer Science","author":"T. Okamoto","year":"1992","unstructured":"T. Okamoto and K. Ohta. Universal Electronic Cash. In Advances in Cryptology-CRYPTO '91, volume 576 of Lecture Notes in Computer Science, pages 324\u2013337, Berlin, 1992. Springer-Verlag."},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"T. Pedersen. Electronic Payments of Small Amounts. Technical Report, DAIMI PD \u2014 495, Aarhus University, August 1995.","DOI":"10.7146\/dpb.v24i495.7023"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"R. L. Rivest. The MD4 Message Digest Algorithm. In Advances in Cryptology \u2014 proceedings of CRYPTO 90, volume 537 of Lecture Notes in Computer Science, pages 303\u2013311. Springer-Verlag, 1991.","DOI":"10.1007\/3-540-38424-3_22"},{"key":"5_CR20","unstructured":"R. Rivest and A. Shamir. PayWord and MicroMint: Two Simple Micropayment Schemes. Manuscript, November 7, 1995"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of the ACM, 21, 1978.","DOI":"10.21236\/ADA606588"},{"key":"5_CR22","unstructured":"Specifications for a Secure Hash Standard. Federal Information Processing Standards Publication, 1992."}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-62494-5_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:12:44Z","timestamp":1605629564000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-62494-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540624943","9783540680475"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-62494-5_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1997]]}}}