{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:49:57Z","timestamp":1742993397644,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319098845"},{"type":"electronic","value":"9783319098852"}],"license":[{"start":{"date-parts":[[2014,8,22]],"date-time":"2014-08-22T00:00:00Z","timestamp":1408665600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,8,22]],"date-time":"2014-08-22T00:00:00Z","timestamp":1408665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-09885-2_18","type":"book-chapter","created":{"date-parts":[[2014,8,21]],"date-time":"2014-08-21T16:49:14Z","timestamp":1408639754000},"page":"325-344","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy on Mobile Coupons Booklets"],"prefix":"10.1007","author":[{"given":"M. Francisca","family":"Hinarejos","sequence":"first","affiliation":[]},{"given":"Andreu Pere","family":"Isern-Dey\u00e0","sequence":"additional","affiliation":[]},{"given":"Josep-Llu\u00eds","family":"Ferrer-Gomila","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,22]]},"reference":[{"key":"18_CR1","unstructured":"Chen, L., Enzmann, M., Sadeghi, A.-D., Schneider, M., Steiner, M.: A privacy-protecting coupon system. In: Proceedings of the 9th International Financial Cryptography and Data Security Conference (FC2005), Lecture Notes in Computer Science, vol. 3570, pp. 578\u2013578. The Commonwealth Of Dominica, Springer, Roseau, Berlin, 28 Feb\u20133 Mar 2005"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Nguyen, L.: Privacy-protecting coupon system revisited. In: Proceedings of the 10th Financial Cryptography and Data Security Conference (FC2006), Lecture Notes in Computer Science, vol. 4107, pp. 266\u2013280. Paradise Cove, British West Indies, Springer, Anguilla, Berlin 27 Feb\u20132 Mar 2006","DOI":"10.1007\/11889663_22"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Canard, S., Gouget, A., Hufschmitt, E.: A handy multi-coupon system. In: 4th International Conference of Applied Cryptography and Network Security (ACNS2006), Lecture Notes in Computer Science, vol. 3989 , pp. 66\u201381. Springer, Singapore, Berlin 6\u20139 June 2006","DOI":"10.1007\/11767480_5"},{"key":"18_CR4","first-page":"184","volume":"2","author":"AN Escalante","year":"2007","unstructured":"Escalante, A.N., L\u00f6hr, H., Sadeghi, A.-R.: A non-sequential unsplittable privacy-protecting multi-coupon scheme. GI Jahrestagung 2, 184\u2013188 (2007)","journal-title":"GI Jahrestagung"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Chen, L., Escalante, A.N., L\u00f6hr, H., Manulis, M., Sadeghi. A.R.: A privacy-protecting multi-coupon scheme with stronger protection against splitting. In: Proceedings of the 11th International Conference on Financial Cryptography and 1st International Conference on Usable Security (FC2007 and USEC2007), Lecture Notes in Computer Science, vol. 4886, pp. 29\u201344. Springer, Scarborough, Trinidad and Tobago, Berlin, 12\u201316 Feb 2007","DOI":"10.1007\/978-3-540-77366-5_4"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Borrego-Jaraba, F., Garrido, P.C., Garcia, G.C., Ruiz, I.L., Gomez-Nieto, M.A.: Ubiquitous NFC solution for the development of tailored marketing strategies based on discount vouchers and loyalty cards. Sensors 13(5), 6334\u20136354 (2013)","DOI":"10.3390\/s130506334"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Escalante, A.N., L\u00f6hr, H., Manulis, M., Sadeghi, A.-R.: Secure multi-coupons for federated environments: privacy-preserving and customer-friendly. In: Proceedings of the 4th International Conference on Information Security Practice and Experience (ISPEC2008). Lecture Notes in Computer Science, vol. 4991, pp. 29\u201344. Springer, Sydney, Australia, Berlin, 21\u201323 Apr 2008","DOI":"10.1007\/978-3-540-79104-1_3"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Isern-Deya, A.-P., Hinarejos, M.F., Ferrer-Gomila, J.-L., Payeras-Capell\u00e0, M.: A secure multicoupon solution for multi-merchant scenarios. In: Proceedings of the IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom2011), pp. 655\u2013663. IEEE, Changsha, China, New York, 16\u201318 Nov 2011","DOI":"10.1109\/TrustCom.2011.84"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Liu X., Xu, Q.-L.: Practical compact multi-coupon systems. In: IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS2009), vol. 3, pp. 211\u2013216. IEEE, Shanghai, China, Washington, 20\u201322 Nov 2009","DOI":"10.1109\/ICICISYS.2009.5358199"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology: Proceedings of Crypto 83, vol. 82, pp. 199\u2013203 (1983)","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Abe, M., Fujisaki, E.: How to Date Blind Signatures. Asiacrypt\u2019 96. Lecture Notes in Computer Science, vol. 1666, pp. 244\u2013251. Springer, Berlin (1996)","DOI":"10.1007\/BFb0034851"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Abe, M., Okamoto, T.: Provably Secure Partially Blind Signatures. CRYPTO 2000. Lecture Notes in Computer Science, vol. 1880, pp. 271\u2013286. Springer, Berlin (2000)","DOI":"10.1007\/3-540-44598-6_17"},{"key":"18_CR13","unstructured":"Chien, H.-Y., Jan, J.-K., Tseng, Y.-M.: RSA-based partially blind signature with low computation. In: Proceedings of the 8th International Conference on Parallel and Distributed Systems (ICPADS2001), pp. 385\u2013389. IEEE, Kyongju City, South Korea, Washington, 26\u201329 June 2001"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Chaum, D., van Heyst, E.: Group signatures. In: Proceedings of the 10th Annual International Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT\u201991, pp. 257\u2013265. Springer, Brighton, UK, Berlin (1991)","DOI":"10.1007\/3-540-46416-6_22"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. Advances in Cryptology\u2013CRYPTO 2004. Lecture Notes in Computer Science, vol. 3152, pp. 227\u2013242. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Boneh, D., Shacham, H.: Group signatures with verifier-local revocation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS \u201904, pp. 168\u2013177. ACM, New York, NY, USA (2004)","DOI":"10.1145\/1030083.1030106"},{"issue":"5","key":"18_CR17","doi-asserted-by":"publisher","first-page":"1328","DOI":"10.1093\/ietfec\/e89-a.5.1328","volume":"89","author":"J Furukawa","year":"2006","unstructured":"Furukawa, J.: An efficient group signature scheme from bilinear maps. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89(5), 1328\u20131338 (2006)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. Advances in Cryptology\u2014CRYPTO 2000, Lecture Notes in Computer Science, vol. 1880, pp. 255\u2013270. Springer, Berlin (2000)","DOI":"10.1007\/3-540-44598-6_16"},{"key":"18_CR19","unstructured":"Escalante, A.N.: Privacy-protecting multi-coupon schemes with stronger protection against splitting. Master\u2019s Thesis. Department of Computer Science, Saarland University, Germany (2008)"}],"container-title":["Studies in Computational Intelligence","Advanced Research in Data Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09885-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T10:15:47Z","timestamp":1676888147000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-09885-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,22]]},"ISBN":["9783319098845","9783319098852"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09885-2_18","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2014,8,22]]},"assertion":[{"value":"22 August 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}