{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:27:38Z","timestamp":1725564458706},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540224204"},{"type":"electronic","value":"9783540278092"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-27809-2_3","type":"book-chapter","created":{"date-parts":[[2010,9,7]],"date-time":"2010-09-07T03:28:35Z","timestamp":1283830115000},"page":"9-23","source":"Crossref","is-referenced-by-count":4,"title":["Microcredits for Verifiable Foreign Service Provider Metering"],"prefix":"10.1007","author":[{"given":"Craig","family":"Gentry","sequence":"first","affiliation":[]},{"given":"Zulfikar","family":"Ramzan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Anderson, R., Manifavas, H., Sutherland, C.: A Practical Electronic Cash System. Manuscript (1995)"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/3-540-44598-6_16","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"G. Ateniese","year":"2000","unstructured":"Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, p. 255. Springer, Heidelberg (2000)"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1007\/0-387-34805-0_39","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"I. Damg\u00e5rd","year":"1990","unstructured":"Damg\u00e5rd, I.: A Design Principle for Hash Functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 416\u2013427. Springer, Heidelberg (1990)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Elwailly, F., Gentry, C., Ramzan, Z.: QuasiModo: Efficient Certificate Validation and Revocation. In: Proc. of Public-Key Cryptography 2004 (2004)","DOI":"10.1007\/978-3-540-24632-9_27"},{"issue":"2","key":"3_CR5","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM Journal on Computing\u00a017(2), 281\u2013308 (1988)","journal-title":"SIAM Journal on Computing"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Hubaux, J.-P., Buttyan, L.: A Micropayment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks. In: Proc. of Financial Cryptography 2003 (2003)","DOI":"10.1007\/978-3-540-45126-6_2"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Leighton, T., Micali, S., Szydlo, M.: Fractal Merkle Tree Representation and Traversal. In: Proc. of the Cryptographer\u2019s Track, RSA Conference (2003)","DOI":"10.1007\/3-540-36563-X_21"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Jarecki, S., Odlyzko, A.: An Efficient Micropayment System Based on Probabilistic Polling. In: Proc. of Financial Cryptography 1997 (1997)","DOI":"10.1007\/3-540-63594-7_77"},{"key":"3_CR9","unstructured":"Jutla, C., Yung, M.: PayTree: Amortized Signatures for flexible Micropayments. In: Proc. of USENIX workshop on Electronic Commerce (1996)"},{"key":"3_CR10","unstructured":"Labaton, S.: MCI Faces Federal Fraud Inquiry on Fees for Long-Distance Calls. New York Times (July 27, 2003)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Lipton, R.J., Ostrovsky, R.: Micro-Payments via Efficient Coin Flipping. In: Proc. of Financial Cryptography 1998 (1998)","DOI":"10.1007\/BFb0055469"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1007\/0-387-34805-0_40","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R. Merkle","year":"1990","unstructured":"Merkle, R.: One-way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 428\u2013446. Springer, Heidelberg (1990)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Merkle, R.: Protocols for Public-Key Cryptography. In: Proc. IEEE Symposium on Security and Privacy (1980)","DOI":"10.1109\/SP.1980.10006"},{"key":"3_CR14","unstructured":"National Institute of Standards. FIPS 180-1: Secure Hash Standard (1995)"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Pedersen, T.: Electronic Payments of Small Amounts. In: Proc. of Security Protocols Workshop (1996)","DOI":"10.1007\/3-540-62494-5_5"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Pedersen, T.: Electronic Payments of Small Amounts. Technical Report 495, DAIMI PD, Aarhus University (August 1995)","DOI":"10.7146\/dpb.v24i495.7023"},{"key":"3_CR17","unstructured":"Pierce, M., O\u2019Mahony, D.: Micropayments for Mobile Networks. In: Proceedings of European Wireless (1999)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: Electronic Lottery Tickets as Micropayments. In: Proc. of Financial Cryptography 1997 (1997)","DOI":"10.1007\/3-540-63594-7_87"},{"key":"#cr-split#-3_CR19.1","doi-asserted-by":"crossref","unstructured":"Rivest, R.L., Shamir, A.: PayWord and MicroMint???Two Simple Micropayment Schemes. In: Proc. of Security Protocols Workshop (1996);","DOI":"10.1007\/3-540-62494-5_6"},{"key":"#cr-split#-3_CR19.2","unstructured":"CryptoBytes (RSA Laboratories), 2(1) (1996)"},{"key":"3_CR20","unstructured":"Tewari, H., O\u2019Mahony, D.: Multiparty Micropayments for Ad-Hoc Networks. In: Proc. of IEEE Wireless Communications and Networking Conference 2003 (2003)"},{"issue":"2","key":"3_CR21","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/MCOM.2003.1179561","volume":"41","author":"H. Tewari","year":"2003","unstructured":"Tewari, H., O\u2019Mahony, D.: Real-Time Payments for Mobile IP. IEEE Communications\u00a041(2), 126\u2013136 (2003)","journal-title":"IEEE Communications"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Wheeler, D.: Transactions Using Bets. In: Proc. Security Protocols Workshop (1996)","DOI":"10.1007\/3-540-62494-5_7"},{"key":"3_CR23","unstructured":"Zhou, J., Lam, K.-Y.: Undeniable Billing in Mobile Communication. In: Proc. of MOBICOM (1996)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-27809-2_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:21:36Z","timestamp":1605759696000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-27809-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540224204","9783540278092"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-27809-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}