{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:55:16Z","timestamp":1725515716619},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540705666"},{"type":"electronic","value":"9783540705673"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-70567-3_8","type":"book-chapter","created":{"date-parts":[[2008,7,15]],"date-time":"2008-07-15T03:57:37Z","timestamp":1216094257000},"page":"97-112","source":"Crossref","is-referenced-by-count":5,"title":["A Privacy-Preserving Ticketing System"],"prefix":"10.1007","author":[{"given":"Kristof","family":"Verslype","sequence":"first","affiliation":[]},{"given":"Bart","family":"De Decker","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Naessens","sequence":"additional","affiliation":[]},{"given":"Girma","family":"Nigusse","sequence":"additional","affiliation":[]},{"given":"Jorn","family":"Lapon","sequence":"additional","affiliation":[]},{"given":"Pieter","family":"Verhaeghe","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Asokan, N., van Herreweghen, E., Steiner, M.: Towards a framework for handling disputes in payment systems. Technical Report RZ 2996 (1998)"},{"key":"8_CR2","unstructured":"Brands, S.: A technical overview of digital credentials (1999)"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Buttyn, L., Hubaux, J.P.: Accountable anonymous access to services in mobile communication systems. In: Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems (1999)","DOI":"10.1109\/RELDIS.1999.805128"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Herreweghen, E.V.: Design and implementation of the idemix anonymous credential system. In: ACM Computer and Communication Security (2002)","DOI":"10.1145\/586110.586114"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J. Camenisch","year":"2001","unstructured":"Camenisch, J., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 93\u2013118. Springer, Heidelberg (2001)"},{"issue":"10","key":"8_CR6","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM\u00a028(10), 1030\u20131044 (1985)","journal-title":"Commun. ACM"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Damgard, I., Pedersen, T., Pfitzmann, B.: Statistical secrecy and multi-bit commitments (1996)","DOI":"10.7146\/brics.v3i45.20047"},{"key":"8_CR8","unstructured":"Fujimura, K., Nakajima, Y.: General-purpose digital ticket framework. In: Proceedings of the 3rd USENIX Workshop on Electronic Commerce, pp. 177\u2013186 (1998)"},{"key":"8_CR9","unstructured":"Green, M., Ateniese, G., Fu, K., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS) (2005)"},{"key":"8_CR10","unstructured":"Hooks, M., Miles, J.: Onion routing and online anonymity. CS182S (2006)"},{"key":"8_CR11","first-page":"44","volume-title":"SP 1997: Proceedings of the 1997 IEEE Symposium on Security and Privacy","author":"D.M. Goldschlag","year":"1997","unstructured":"Goldschlag, D.M., Syverson, P.F., Reed, M.G.: Anonymous connections and onion routing. In: SP 1997: Proceedings of the 1997 IEEE Symposium on Security and Privacy, p. 44. IEEE Computer Society, Washington (1997)"},{"key":"8_CR12","first-page":"72","volume-title":"CCS 2007: Proceedings of the 14th ACM conference on Computer and communications security","author":"A. Kapadia","year":"2007","unstructured":"Kapadia, A., Tsang, P.P., Au, M.H., Smith, S.W.: Blacklistable anonymous credentials: blocking misbehaving users without TTPs. In: CCS 2007: Proceedings of the 14th ACM conference on Computer and communications security, pp. 72\u201381. ACM Press, New York (2007)"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Patel, B., Crowcroft, J.: Ticket based service access for the mobile user. In: Proceedings of Mobicom (1997)","DOI":"10.1145\/262116.262150"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-46766-1_9","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"T.P. Pedersen","year":"1992","unstructured":"Pedersen, T.P.: Non-interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 129\u2013140. Springer, Heidelberg (1992)"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","volume-title":"Privacy Enhancing Technologies","author":"B. Defend","year":"2006","unstructured":"Defend, B., Heydt-Benjamin, T.S., Chae, H., Fu, K.: Privacy for Public Transportation. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.\u00a04258. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security XXII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-70567-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T13:15:38Z","timestamp":1557666938000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-70567-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540705666","9783540705673"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-70567-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}