{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:55:59Z","timestamp":1725558959499},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255215"},{"type":"electronic","value":"9783540320043"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-32004-3_3","type":"book-chapter","created":{"date-parts":[[2010,7,11]],"date-time":"2010-07-11T17:15:56Z","timestamp":1278868556000},"page":"18-30","source":"Crossref","is-referenced-by-count":0,"title":["P2P Digital Value Fair Trading System Using Smart Cards"],"prefix":"10.1007","author":[{"given":"Masayuki","family":"Hanadate","sequence":"first","affiliation":[]},{"given":"Masayuki","family":"Terada","sequence":"additional","affiliation":[]},{"given":"Shinji","family":"Nagao","sequence":"additional","affiliation":[]},{"given":"Toshiyuki","family":"Miyazawa","sequence":"additional","affiliation":[]},{"given":"Yukiko","family":"Yosuke","sequence":"additional","affiliation":[]},{"given":"Seiji","family":"Tomita","sequence":"additional","affiliation":[]},{"given":"Ko","family":"Fujimura","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Zhou, J.: Non-repudiation in Electronic Commerce. Artech House, Inc. (2001)"},{"issue":"1","key":"3_CR2","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1093\/comjnl\/46.1.55","volume":"46","author":"H. Pagnia","year":"2003","unstructured":"Pagnia, H., Vogt, H., G\u00e4rtner, C.: Fair Exchange. The Computer Journal\u00a046(1), 55\u201375 (2003)","journal-title":"The Computer Journal"},{"key":"3_CR3","first-page":"88","volume-title":"Proceedings of the IEEE Symposium on Research in Security and Privacy","author":"N. Asokan","year":"1998","unstructured":"Asokan, N., Shoup, V., Waidner, M.: Asynchronous protocols for optimistic fair exchange. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 88\u201399. IEEE Computer Society Press, Los Alamitos (1998)"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/3-540-45598-1_11","volume-title":"Electronic Commerce","author":"H. Vogt","year":"2001","unstructured":"Vogt, H., Pagnia, H., G\u00e4rtner, C.: Using smart cards for fair exchange. In: Fiege, L., M\u00fchl, G., Wilhelm, U.G. (eds.) WELCOM 2001. LNCS, vol.\u00a02232, pp. 101\u2013113. Springer, Heidelberg (2001)"},{"key":"3_CR5","first-page":"127","volume-title":"Mobile Networks and Applications","author":"H. Vogt","year":"2003","unstructured":"Vogt, H., G\u00e4rtner, C., Pagnia, H.: Supporting Fair Exchange in Mobile Environments. In: Mobile Networks and Applications, vol.\u00a08, pp. 127\u2013136. Kluwer Academics Publishers, Dordrecht (2003)"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","first-page":"350","volume-title":"SEMPER 2000","year":"2000","unstructured":"Lacoste, G., Pfitzmann, B., Steiner, M., Waidner, M. (eds.): SEMPER 2000. LNCS, vol.\u00a01854, p. 350. Springer, Heidelberg (2000)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Iguchi, M., Terada, M., Nakamura, Y., Fujimura, K.: Voucher-Integrated Trading Model for C2B and C2C E-Commerce System Development. In: 2nd IFIP Conference on e-Commerce, e-Business, and e-Government, IFIP I3E 2002 (2002)","DOI":"10.1007\/978-0-387-35617-4_27"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Terada, M., Iguchi, M., Hanadate, M., Fujimura, K.: An Optimistic Fair Exchange Protocol for Trading Electronic Rights. In: 6th Smart Card Research and Advanced Application IFIP Conference(Cardis2004) (2004)","DOI":"10.1007\/1-4020-8147-2_17"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Terada, M., Iguchi, M., Hanadate, M., Fujimura, K.: Copy prevention scheme for rights trading infrastructure. In: 4th Smart Card Research and Advanced Application IFIP Conference(Cardis2000) (2000)","DOI":"10.1007\/978-0-387-35528-3_4"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-32004-3_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:33:54Z","timestamp":1605742434000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-32004-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255215","9783540320043"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-32004-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}