{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:14:23Z","timestamp":1758273263285},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540635949"},{"type":"electronic","value":"9783540696070"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-63594-7_64","type":"book-chapter","created":{"date-parts":[[2010,4,5]],"date-time":"2010-04-05T16:01:15Z","timestamp":1270483275000},"page":"17-31","source":"Crossref","is-referenced-by-count":59,"title":["How to make personalized web browsing simple, secure, and anonymous"],"prefix":"10.1007","author":[{"given":"Eran","family":"Gabber","sequence":"first","affiliation":[]},{"given":"Phillip B.","family":"Gibbons","sequence":"additional","affiliation":[]},{"given":"Yossi","family":"Matias","sequence":"additional","affiliation":[]},{"given":"Alain","family":"Mayer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,7,19]]},"reference":[{"unstructured":"The Anonymizer. http:\/\/www.anonymizer.com","key":"2_CR1"},{"doi-asserted-by":"crossref","unstructured":"S. Brands, Untraceable off-line cash in wallet with observer. Crypto'93, Springer-Verlag LNCS 773, pp. 302\u2013318.","key":"2_CR2","DOI":"10.1007\/3-540-48329-2_26"},{"unstructured":"D. Bleichenbacher, E. Gabber, P. B. Gibbons, Y. Matias, A. Mayer, On personalized yet anonymous interaction. Technical report, Bell Laboratories, April 1997.","key":"2_CR3"},{"unstructured":"Cybercash. http:\/\/ww.cybercash.com","key":"2_CR4"},{"issue":"10","key":"2_CR5","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"D. Chaum, Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10), October 1985, pp. 1030\u20131044.","journal-title":"Communications of the ACM"},{"unstructured":"L. Cottrell, Mixmaster and remailer attacks. http:\/\/obsucra.com\/ loki\/ remailer\/remailer-essay.html.","key":"2_CR6"},{"doi-asserted-by":"crossref","unstructured":"D. Chaum, A. Fiat, M. Naor, Untraceable electronic cash. Crypto'88, Springer-Verlag LNCS 403, pp. 319\u2013327.","key":"2_CR7","DOI":"10.1007\/0-387-34799-2_25"},{"unstructured":"B. Cox, J.D. Tygar, M. Sirbu, NetBill security and transaction protocol. 1st Usenix Workshop on Electronic Commerce, July 1995.","key":"2_CR8"},{"unstructured":"An introduction to ecash. http:\/\/AAA.digicash.com\/publish\/ecashintro\/ ecash-intro.html.","key":"2_CR9"},{"doi-asserted-by":"crossref","unstructured":"M. Franklin, M. Yung, Secure and efficient offline digital money.20th ICALP, Springer-Verlag LNCS 700, 1993, pp. 265\u2013276.","key":"2_CR10","DOI":"10.1007\/3-540-56939-1_78"},{"issue":"4","key":"2_CR11","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich, S. Goldwasser, S. Micam, How to construct random functions. J. of the ACM, 33(4), 1986, pp. 210\u2013217.","journal-title":"J. of the ACM"},{"unstructured":"C. Gulcu, G. Tsudik, Mixing email with babel. ISOC Symposium on Network and Distributed System Security, 1996.","key":"2_CR12"},{"unstructured":"I. Goldberg, D. Wagner, E. Brewer, Privacy-enhancing technologies for the internet. Compcon'97.","key":"2_CR13"},{"unstructured":"R. T. Fielding, J. Gettys, J. Mogul, H. Frystik Nielsen, T. Berners-Lee, HTTP\/1.1., Internet RFC 2068, 1996.","key":"2_CR14"},{"unstructured":"JEPI. AAA. w3. org\/pub\/WWW\/Payments\/","key":"2_CR15"},{"doi-asserted-by":"crossref","unstructured":"S. Low, N. Maxemchuk, S. Paul, Anonymous credit cards. 2nd ACM Conf. on Computer and Communications Security, 1994, pp. 108\u2013117.","key":"2_CR16","DOI":"10.1145\/191177.191199"},{"unstructured":"A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.","key":"2_CR17"},{"doi-asserted-by":"crossref","unstructured":"T. Okamoto, K. Ohta, Universal electronic cash. Crypto'91, Springer-Verlag LNCS 576, pp. 324\u2013337.","key":"2_CR18","DOI":"10.1007\/3-540-46766-1_27"},{"doi-asserted-by":"crossref","unstructured":"A. Pfitzmann, M. Waidner, Networks without user observability-design options. Eurocrypt'85, Springer-Verlag LNCS 219, pp. 245\u2013253.","key":"2_CR19","DOI":"10.1007\/3-540-39805-8_29"},{"doi-asserted-by":"crossref","unstructured":"D. Simon, Anonymous communication and anonymous cash. Crypto'96, Springer Verlag LNCS 1109, pp. 61\u201373.","key":"2_CR20","DOI":"10.1007\/3-540-68697-5_5"},{"doi-asserted-by":"crossref","unstructured":"P. Syverson, D. Goldschlag, M. Reed, Anonymous connections and onion routing. IEEE Symposium on Security and Privacy, 1997, to appear.","key":"2_CR21","DOI":"10.1109\/SECPRI.1997.601314"},{"unstructured":"P. Karlton, A. Freier, P. Kocher, The SSL Protocol, 3.0. Internet Draft, March 1996.","key":"2_CR22"},{"unstructured":"D. Taylor, \u201cThe Webmaster: Web Site Memory with Cookies\u201d ;login. (Usenix newsletter), October 1996, pp. 32\u201335.","key":"2_CR23"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-63594-7_64","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T20:26:14Z","timestamp":1558988774000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-63594-7_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540635949","9783540696070"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-63594-7_64","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1997]]}}}