{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T05:32:24Z","timestamp":1740547944748,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220602"},{"type":"electronic","value":"9783540247685"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24768-5_24","type":"book-chapter","created":{"date-parts":[[2010,9,11]],"date-time":"2010-09-11T01:14:08Z","timestamp":1284167648000},"page":"223-232","source":"Crossref","is-referenced-by-count":0,"title":["Fair Exchange to Achieve Atomicity in Payments of High Amounts Using Electronic Cash"],"prefix":"10.1007","author":[{"given":"Magdalena","family":"Payeras-Capella","sequence":"first","affiliation":[]},{"given":"Josep Llu\u00eds","family":"Ferrer-Gomila","sequence":"additional","affiliation":[]},{"given":"Lloren\u00e7","family":"Huguet-Rotger","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/3-540-45499-3_35","volume-title":"Algebraic Methodology and Software Technology","author":"K. Adi","year":"2000","unstructured":"Adi, K., Debbadi, M., Mejri, M.: A new logic for electronic commerce protocolos. In: Rus, T. (ed.) AMAST 2000. LNCS, vol.\u00a01816, pp. 499\u2013513. Springer, Heidelberg (2000)"},{"unstructured":"Asokan, N., Van Herreweghen, E., Steiner, M.: Towards a framework for handling disputes in payment systems. In: 3rd Usenix workshop on electronic commerce, pp. 187\u2013202 (1998)","key":"24_CR2"},{"unstructured":"Camp, J., Harkavy, M., Tygar, J.D., Yee, B.: Anonymous atomic transactions. In: 2nd USENIX workshop on electronic commerce, pp. 123\u2013133 (1996)","key":"24_CR3"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1007\/3-540-49264-X_18","volume-title":"Advances in Cryptology - EUROCRYPT \u201995","author":"M. Jakobsson","year":"1995","unstructured":"Jakobsson, M.: Ripping coins for a fair exchange. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol.\u00a0921, pp. 220\u2013230. Springer, Heidelberg (1995)"},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/3-540-45068-8_12","volume-title":"Web Engineering","author":"J.L. Ferrer","year":"2003","unstructured":"Ferrer, J.L., Payeras, M., Huguet, L.: A fully anonymous electronic payment scheme for B2B. In: Cueva Lovelle, J.M., Rodr\u00edguez, B.M.G., Gayo, J.E.L., del Pueto Paule Ruiz, M., Aguilar, L.J. (eds.) ICWE 2003. LNCS, vol.\u00a02722, pp. 76\u201379. Springer, Heidelberg (2003)"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1007\/3-540-45439-X_27","volume-title":"Information Security","author":"J.L. Ferrer","year":"2001","unstructured":"Ferrer, J.L., Payeras, M., Huguet, L.: Efficient optimistic N-Party contract signing protocol. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol.\u00a02200, pp. 394\u2013407. Springer, Heidelberg (2001)"},{"key":"24_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/3-540-63594-7_79","volume-title":"Financial Cryptography","author":"H. Pagnia","year":"1997","unstructured":"Pagnia, H., Jansen, R.: Towards multiple payment schemes for digital money. In: Luby, M., Rolim, J.D.P., Serna, M. (eds.) FC 1997. LNCS, vol.\u00a01318, pp. 203\u2013216. Springer, Heidelberg (1997)"},{"unstructured":"Schuldt, H., Popovivi, A., Schek, H.: Give me all I pay for \u2013 Execution guarantees in electronic commerce payment processes. In: Informatik 1999 \u2013Workshop \u201cUnternehmensweite und unternehmens\u00fcbergreifende Workflows: Konzepte, Systeme, Anwendungen\u201d (1999)","key":"24_CR8"},{"key":"24_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/3-540-46466-2_10","volume-title":"Transactions and Database Dynamics","author":"H. Schuldt","year":"2000","unstructured":"Schuldt, H., Popovivi, A., Schek, H.: Execution guarantees in electronic commerce payments. In: Saake, G., Schwarz, K., T\u00fcrker, C. (eds.) FoMLaDO 1999. LNCS, vol.\u00a01773, p. 193. Springer, Heidelberg (2000)"},{"doi-asserted-by":"crossref","unstructured":"Su, J., Tygar, J.D.: Building blocs for atomicity in electronic commerce. In: 6th USENIX security symposium (1996)","key":"24_CR10","DOI":"10.1145\/248052.248054"},{"unstructured":"Tang, L.: Verifiable transaction atomicity for electronic payment protocols. In: IEEE ICDCS 1996, pp. 261\u2013269 (1996)","key":"24_CR11"},{"doi-asserted-by":"crossref","unstructured":"Tygar, J.D.: Atomicity in electronic commerce. In: 15th annual ACM symposium on principles of distributed computing, pp. 8\u201326 (1996)","key":"24_CR12","DOI":"10.1145\/248052.248054"},{"doi-asserted-by":"crossref","unstructured":"Vogt, H., Pagnia, H., G\u00e4rtner, F.C.: Modular fair exchange protocols for electronic commerce. In: 15th Annual Computer Security Applications Conference, ACSAC 1999, pp. 3\u201311 (1999)","key":"24_CR13","DOI":"10.1109\/CSAC.1999.816008"},{"unstructured":"Wong, H.C.: Protecting individuals\u2019 interests in electronic commerce protocols. Ph. D. Thesis. Carnegie Mellon University","key":"24_CR14"},{"key":"24_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/3-540-47790-X_2","volume-title":"Information Security","author":"S. Xu","year":"1999","unstructured":"Xu, S., Yung, M., Zhang, G., Zhu, H.: Money conservation via atomicity in fair offline e-cash. In: Zheng, Y., Mambo, M. (eds.) ISW 1999. LNCS, vol.\u00a01729, pp. 14\u201331. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24768-5_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T18:07:39Z","timestamp":1740506859000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24768-5_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220602","9783540247685"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24768-5_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}