{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T15:26:23Z","timestamp":1725981983455},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319935232"},{"type":"electronic","value":"9783319935249"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93524-9_11","type":"book-chapter","created":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T02:37:00Z","timestamp":1529462220000},"page":"165-176","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons"],"prefix":"10.1007","author":[{"given":"Pau","family":"Conejero-Alberola","sequence":"first","affiliation":[]},{"given":"M. Francisca","family":"Hinarejos","sequence":"additional","affiliation":[]},{"given":"Josep-Llu\u00eds","family":"Ferrer-Gomila","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,21]]},"reference":[{"key":"11_CR1","unstructured":"Coupon Savings Report (2016). \nhttps:\/\/www.nchmarketing.com\/nchpressreleases.aspx\n\n. Accessed 17 Aug 2017"},{"key":"11_CR2","unstructured":"Terms and Conditions - Christmas promotion 31 days. \nhttps:\/\/app.mcdonalds.es\/landing\/legal\/legal31DiasLocosNavidad.html\n\n. Accessed 17 Aug 2017"},{"key":"11_CR3","unstructured":"Kumar, M., Anand, R., Jhingran, A., Mohan, R.: Sales promotions on the Internet. In: Proceedings of the 3rd USENIX Workshop on Electronic Commerce, pp. 167\u2013176, Boston (1998)"},{"issue":"11","key":"11_CR4","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/S1389-1286(99)00041-9","volume":"31","author":"M Jakobsson","year":"1999","unstructured":"Jakobsson, M., Mackenzie, P.D., Stern, J.P.: Secure and lightweight advertising on the web. J. Comput. Telecommun. Netw. 31(11), 1101\u20131109 (1999)","journal-title":"J. Comput. Telecommun. Netw."},{"issue":"1","key":"11_CR5","first-page":"273","volume":"6","author":"CC Chang","year":"2006","unstructured":"Chang, C.C., Wu, C.C., Lin, I.C.: A secure e-coupon system for mobile users. Int. J. Comput. Sci. Netw. Secur. 6(1), 273\u2013280 (2006)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Aigner, M., Dominikus, S., Feldhofer, M.: A system of secure virtual coupons using NFC technology. In: Proceedings of IEEE International Conference on Pervasive Computing and Communication Workshops, pp. 362\u2013366, New York (2007)","DOI":"10.1109\/PERCOMW.2007.15"},{"issue":"4","key":"11_CR7","doi-asserted-by":"publisher","first-page":"2981","DOI":"10.1007\/s11277-014-1680-8","volume":"77","author":"CC Chang","year":"2014","unstructured":"Chang, C.C., Sun, C.Y.: A secure and efficient authentication scheme for e-coupon systems. Wirel. Pers. Commun. 77(4), 2981\u20132996 (2014)","journal-title":"Wirel. Pers. Commun."},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Chang, C.C., Lin, I.C., Chi, Y.L.: Secure electronic coupons. In: Proceedings - 10th Asia Joint Conference on Information Security, AsiaJCIS 2015, pp. 104\u2013109 (2015)","DOI":"10.1109\/AsiaJCIS.2015.10"},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1007\/s11235-016-0201-3","volume":"64","author":"W Liu","year":"2017","unstructured":"Liu, W., Mu, Y., Yang, G., Yu, Y.: Efficient E-coupon systems with strong user privacy. Telecommun. Syst. 64, 695\u2013708 (2017)","journal-title":"Telecommun. Syst."},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-642-15898-8_13","volume-title":"Formal Methods for Industrial Critical Systems","author":"J Camenisch","year":"2010","unstructured":"Camenisch, J., M\u00f6dersheim, S., Sommer, D.: A formal model of identity mixer. In: Kowalewski, S., Roveri, M. (eds.) FMICS 2010. LNCS, vol. 6371, pp. 198\u2013214. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-15898-8_13"},{"issue":"3","key":"11_CR11","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"CP Schnorr","year":"1991","unstructured":"Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161\u2013174 (1991)","journal-title":"J. Cryptol."},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/3-540-36413-7_20","volume-title":"Security in Communication Networks","author":"J Camenisch","year":"2003","unstructured":"Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Persiano, G., Galdi, C. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268\u2013289. Springer, Heidelberg (2003). \nhttps:\/\/doi.org\/10.1007\/3-540-36413-7_20"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practice"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93524-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T02:42:01Z","timestamp":1529462521000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-93524-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319935232","9783319935249"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93524-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}