{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:41:27Z","timestamp":1725871287617},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319494449"},{"type":"electronic","value":"9783319494456"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49445-6_14","type":"book-chapter","created":{"date-parts":[[2016,11,17]],"date-time":"2016-11-17T12:50:31Z","timestamp":1479387031000},"page":"251-270","source":"Crossref","is-referenced-by-count":1,"title":["Enabling Secure Web Payments with GNU Taler"],"prefix":"10.1007","author":[{"given":"Jeffrey","family":"Burdges","sequence":"first","affiliation":[]},{"given":"Florian","family":"Dold","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Grothoff","sequence":"additional","affiliation":[]},{"given":"Marcello","family":"Stanisci","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,18]]},"reference":[{"key":"14_CR1","unstructured":"Chiptan\/cardtan: What you see is what you sign (2016). http:\/\/www.kobil.com\/solutions\/identity-access-card-readers\/chiptan\/"},{"key":"14_CR2","unstructured":"EMVCO (2016). http:\/\/www.emvco.com\/"},{"key":"14_CR3","unstructured":"Bahack, L.: Theoretical Bitcoin attacks with less than half of the computational power (draft). IACR Cryptology ePrint Archive 2013, 868 (2013). http:\/\/eprint.iacr.org\/2013\/868"},{"key":"14_CR4","unstructured":"Beigel, O.: What Bitcoin exchanges won\u2019t tell you about fees (2015). https:\/\/www.cryptocoinsnews.com\/what-bitcoin-exchanges-wont-tell-you-about-fees\/ . Accessed 10 Feb 2016"},{"key":"14_CR5","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/978-1-4757-0602-4_18","volume-title":"Advances in cryptology","author":"D Chaum","year":"1983","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in cryptology, pp. 199\u2013203. Springer, New York (1983)"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/0-387-34799-2_25","volume-title":"Advances in Cryptology \u2014 CRYPTO 1988","author":"D Chaum","year":"1990","unstructured":"Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319\u2013327. Springer, Heidelberg (1990). doi: 10.1007\/0-387-34799-2_25"},{"key":"14_CR7","unstructured":"Constine, J.: After the Regretsy and Diaspora account freezes, we\u2019ve lost confidence in PayPal, December 2011. http:\/\/techcrunch.com\/2011\/12\/06\/paypal-account-freeze\/"},{"key":"14_CR8","unstructured":"Dold, F., Totakura, S.H., M\u00fcller, B., Burdges, J., Grothoff, C.: Taler: taxable anonymous libre electronic reserves"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Dominguez, K.M.: Does central bank intervention increase the volatility of foreign exchange rates? Working Paper 4532, National Bureau of Economic Research, November 1993. http:\/\/www.nber.org\/papers\/w4532","DOI":"10.3386\/w4532"},{"key":"14_CR10","unstructured":"Dunn, J.E.: Eurograbber SMS trojan steals 36 million from online banks, December 2012. http:\/\/www.techworld.com\/news\/security\/eurograbber-sms-trojan-steals-36-million-from-online-banks-3415014\/"},{"key":"14_CR11","unstructured":"Ehrenberg, B.: How much is your personal data worth? April 2014. http:\/\/www.theguardian.com\/news\/datablog\/2014\/apr\/22\/how-much-is-personal-data-worth"},{"key":"14_CR12","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. CoRR abs\/1311.0243 (2013). http:\/\/arxiv.org\/abs\/1311.0243"},{"key":"14_CR13","unstructured":"Green, M., Miers, I.: Bolt: anonymous payment channels for decentralized currencies. Cryptology ePrint Archive, Report 2016\/701 (2016). http:\/\/eprint.iacr.org\/2016\/701"},{"key":"14_CR14","unstructured":"Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on Bitcoin\u2019s peer-to-peer network. In: Proceedings of the 24th USENIX Conference on Security Symposium, SEC 2015, pp. 129\u2013144. USENIX Association, Berkeley, CA, USA (2015). http:\/\/dl.acm.org\/citation.cfm?id=2831143.2831152"},{"key":"14_CR15","unstructured":"Holz, R.: Empirical analysis of Public Key Infrastructures and investigation of improvements. Ph.D. thesis, TU Munich (2014)"},{"key":"14_CR16","unstructured":"Jeffries, A.: Why don\u2019t economists like Bitcoin? (2013). http:\/\/www.theverge.com\/2013\/12\/31\/5260534\/krugman-bitcoin-evil-economists . Accessed 28 Feb 2016"},{"key":"14_CR17","unstructured":"Jones, R.: Cap on card fees could lead to lower prices for consumers, July 2015. http:\/\/www.theguardian.com\/money\/2015\/jul\/27\/cap-on-card-fees-retailers"},{"key":"14_CR18","unstructured":"van Kersteren, A.: Cross-origin resource sharing, January 2014. http:\/\/www.w3.org\/TR\/cors\/"},{"key":"14_CR19","unstructured":"Lewis, N.: Bitcoin is a junk currency, but it lays the foundation for better money (2013). http:\/\/www.forbes.com\/sites\/nathanlewis\/2013\/05\/09\/bitcoin-is-a-junk-currency-but-it-lays-the-foundation-for-better-money\/ . Accessed 28 Feb 2016"},{"key":"14_CR20","unstructured":"Malmo, C.: Bitcoin is unsustainable (2015). https:\/\/www.cryptocoinsnews.com\/what-bitcoin-exchanges-wont-tell-you-about-fees\/ . Accessed 10 Feb 2016"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: Anonymous distributed e-cash from Bitcoin. In: IEEE Symposium on Security and Privacy (SP), pp. 397\u2013411. IEEE (2013)","DOI":"10.1109\/SP.2013.34"},{"key":"14_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/978-3-642-14577-3_27","volume-title":"Financial Cryptography and Data Security","author":"SJ Murdoch","year":"2010","unstructured":"Murdoch, S.J., Anderson, R.: Verified by Visa and MasterCard SecureCode: or, how not to design authentication. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 336\u2013342. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-14577-3_27 . https:\/\/www.cl.cam.ac.uk\/~rja14\/Papers\/fc10vbvsecurecode.pdf"},{"key":"14_CR23","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"14_CR24","unstructured":"NYA International: Cyber extortion risk report 2015, October 2015. http:\/\/www.nyainternational.com\/sites\/default\/files\/nya-publications\/151027_Cyber_Extortion_Risk_Report_2015_0.pdf"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Perlman, M.: The Invention of Capitalism: Classical Political Economy and the Secret History of Primitive Accumulation. Duke University Press Books (2000)","DOI":"10.1215\/9780822380696"},{"key":"14_CR26","volume-title":"Security and Privacy in Social Networks","author":"F Reid","year":"2013","unstructured":"Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Altshuler, Y., Elovici, Y., Cremers, A.B., Aharony, N., Pentland, A. (eds.) Security and Privacy in Social Networks. Springer, New York (2013). http:\/\/arxiv.org\/abs\/1107.4524"},{"key":"14_CR27","unstructured":"IBI research: Digitalisierung der gesellschaft 2014 \u2013 aktuelle einsch\u00e4tzungen und trends (2014). http:\/\/www.ecommerce-leitfaden.de\/digitalisierung-der-gesellschaft-2014.html"},{"key":"14_CR28","unstructured":"Riley, M., Elgin, B., Lawrence, D., Matlack, C.: Missed alarms and 40 million stolen credit card numbers: how target blew it, March 2013. http:\/\/www.bloomberg.com\/bw\/articles\/2014-03-13\/target-missed-alarms-in-epic-hack-of-credit-card-data"},{"key":"14_CR29","unstructured":"Rundle, G.: The humble credit card is now a political tool, October 2011. http:\/\/www.crikey.com.au\/2011\/10\/25\/rundle-humble-credit-card-now-a-political-tool-just-ask-wikileaks\/"},{"key":"14_CR30","unstructured":"Stallman, R.: How much surveillance can democracy withstand? WIRED (2013)"},{"key":"14_CR31","unstructured":"Sweney, M.: City AM becomes first UK newspaper to ban ad blocker users, October 2015. http:\/\/www.theguardian.com\/media\/2015\/oct\/20\/city-am-ban-ad-blocker-users"},{"key":"14_CR32","unstructured":"Szent-Ivanyi, T.: Wie firmen ihre kassen manipulieren, August 2015. http:\/\/www.fr-online.de\/wirtschaft\/steuerhinterziehung-wie-firmen-ihre-kassen-manipulieren-,1472780,31535960.html"},{"key":"14_CR33","doi-asserted-by":"crossref","unstructured":"Trautman, L.J.: Virtual currencies: Bitcoin & what now after Liberty Reserve, Silk Road, and Mt. Gox? Richmond J. Law Technol. 20(4) (2014)","DOI":"10.2139\/ssrn.2393537"},{"issue":"3","key":"14_CR34","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1111\/1468-0289.00063","volume":"50","author":"O Volckart","year":"1997","unstructured":"Volckart, O.: Early beginnings of the quantity theory of money and their context in polish and prussian monetary policies, c. 1520\u20131550. Economic Hist. Rev. 50(3), 430\u2013449 (1997). http:\/\/www.jstor.org\/stable\/2599810","journal-title":"Economic Hist. Rev."},{"key":"14_CR35","unstructured":"W3c: Web payments payment flows, February 2016. https:\/\/github.com\/w3c\/webpayments\/tree\/gh-pages\/PaymentFlows"},{"key":"14_CR36","doi-asserted-by":"crossref","unstructured":"Wright, S.: PCI DSS A Practical Guide to Implementing and Maintaining Compliance. 3rd edn. It Governance Ltd. (2011)","DOI":"10.2307\/j.ctt5hh5z9"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49445-6_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T17:27:34Z","timestamp":1718904454000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49445-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319494449","9783319494456"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49445-6_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}