{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:06:53Z","timestamp":1725574013422},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540408086"},{"type":"electronic","value":"9783540452294"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45229-4_7","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T00:58:04Z","timestamp":1294361884000},"page":"62-71","source":"Crossref","is-referenced-by-count":0,"title":["Smart Card Based Mobile Payment with Fairness Revocation Mechanism"],"prefix":"10.1007","author":[{"given":"Hyung-Woo","family":"Lee","sequence":"first","affiliation":[]},{"given":"Im-Yeong","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Dong-iK","family":"Oh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/3-540-45598-1_10","volume-title":"Electronic Commerce","author":"K. Wrona","year":"2001","unstructured":"Wrona, K., Schuba, M., Zavagli, G.: Mobile Payments - State of the Art and Open Problems. In: Fiege, L., M\u00fchl, G., Wilhelm, U.G. (eds.) WELCOM 2001. LNCS, vol.\u00a02232, pp. 88\u2013100. Springer, Heidelberg (2001)"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/3-540-49162-7_25","volume-title":"Public Key Cryptography","author":"J. Zhou","year":"1999","unstructured":"Zhou, J., Lam, K.-Y.: A Secure Pay-per View Scheme for Web-Based Video Service. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol.\u00a01560, pp. 315\u2013326. Springer, Heidelberg (1999)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Peirce, M., O\u2019Mahony, D.: Flexible Real-Time Payment Methods for Mobile Communications. IEEE Personal Communications, 44\u201355 (December 1999)","DOI":"10.1109\/98.813822"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/3-540-44463-7_42","volume-title":"Electronic Commerce and Web Technologies","author":"A. Tsalgatidou","year":"2000","unstructured":"Tsalgatidou, A., Veijalainen, J.: Mobile Electronic Commerce: Emerging Issues. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2000. LNCS, vol.\u00a01875, pp. 477\u2013486. Springer, Heidelberg (2000)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","first-page":"199","volume-title":"Advances in Cryptology - Crypto 1982","author":"D. Chaum","year":"1982","unstructured":"Chaum, D.: Blind Signature for Untraceable Payments. In: Advances in Cryptology - Crypto 1982. LNCS, pp. 199\u2013203. Springer, Heidelberg (1982)"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/238168.238193","volume-title":"3rd ACM Conference on Computer Communication Security","author":"J.L. Camenisch","year":"1996","unstructured":"Camenisch, J.L., Piveteau, J.-M., Stadler, M.A.: An Efficient Fair Payment System. In: 3rd ACM Conference on Computer Communication Security, pp. 88\u201394. ACM Press, New York (1996)"},{"issue":"4","key":"7_CR7","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-30","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithm. IEEE Transactions on Information Theory\u00a0IT-30(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"7_CR8","unstructured":"Zhang, R., Kudoh, M., Matsuura, K., ImaiInstance, H.: Revocation of Digital Signature and Its Applications. In: The 2002 Symposium on Cryptography and Information Security Shirahama, SCIS 2002, Japan, January 29 - February 1 (2002)"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/3-540-49264-X_17","volume-title":"Advances in Cryptology - EUROCRYPT \u201995","author":"M. Stadler","year":"1995","unstructured":"Stadler, M., Piveteau, J.-M., Camenisch, J.: Fair Blind Signature. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol.\u00a0921, pp. 209\u2013219. Springer, Heidelberg (1995)"},{"volume-title":"Handbook of Applied Cryptography","year":"1996","key":"7_CR10","unstructured":"Menezed, A.J., van Oorschot, P.C., Vanstone, S.A. (eds.): Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"7_CR11","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography, 2nd edn. Wiley, Chichester (1996)","edition":"2"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Petersen, H., Poupard, G.: Efficient Scalable Fair Cash with Off-line Extortion Prevention, Technical Report LIENS-97-7, Ecole Normale Superieure (May 1997)","DOI":"10.1007\/BFb0028503"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/3-540-45600-7_51","volume-title":"Information and Communications Security","author":"G. Maitland","year":"2001","unstructured":"Maitland, G., Boyd, C.: Fair Electronic Cash Based on a Group Signature Scheme. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol.\u00a02229, pp. 209\u2013219. Springer, Heidelberg (2001)"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/3-540-45450-0_35","volume-title":"Information Security and Privacy","author":"D.-G. Han","year":"2002","unstructured":"Han, D.-G., Park, H.-Y., Park, Y.-H., Lee, S., Lee, D.H., Yang, H.-J.: A Practical Approach Defeating Blackmailing. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol.\u00a02384, pp. 119\u2013132. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","E-Commerce and Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45229-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T13:11:46Z","timestamp":1559913106000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45229-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540408086","9783540452294"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45229-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}