{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:33:20Z","timestamp":1725489200971},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540734079"},{"type":"electronic","value":"9783540734086"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73408-6_24","type":"book-chapter","created":{"date-parts":[[2007,8,13]],"date-time":"2007-08-13T13:23:01Z","timestamp":1187011381000},"page":"330-337","source":"Crossref","is-referenced-by-count":0,"title":["Electronic Payment Scheme Using Identity-Based Cryptography"],"prefix":"10.1007","author":[{"given":"Son Thanh","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Chunming","family":"Rong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","series-title":"Lecture Notes in Computer Science","first-page":"217","volume-title":"Computer Security - ESORICS 1994","author":"B. Jean-Paul","year":"1994","unstructured":"Jean-Paul, B., et al.: The ESPRIT project CAFE \u2013 High Security Digital Payment System. In: Gollmann, D. (ed.) Computer Security - ESORICS 1994. LNCS, vol.\u00a0875, pp. 217\u2013230. Springer, Heidelberg (1994)"},{"key":"24_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"24_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/3-540-48071-4_7","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"D. Chaum","year":"1993","unstructured":"Chaum, D., Pedersen, T.: Wallet Databases with Observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 89\u2013105. Springer, Heidelberg (1993)"},{"key":"24_CR4","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1007\/3-540-45325-3_32","volume-title":"Cryptography and Coding","author":"Clifford Cocks","year":"2001","unstructured":"Cocks, C.: An Identity-based Encryption Scheme Based on Quadratic Residues. In: Proceeding of 8th IMA International Conference on Cryptography and Coding, pp. 26\u201328 (2001)"},{"key":"24_CR5","unstructured":"Gemplus. \n                  \n                    http:\/\/www.gemplus.com"},{"key":"24_CR6","unstructured":"Gjerde, M., et al.: Decentralized Credentials. In: Proceedings of the Seventh Nordic Workshop on Secure IT Systems, NORDSEC, pp. 151\u2013159 (2003)"},{"key":"24_CR7","unstructured":"GSM Association. \n                  \n                    www.gsmworld.com"},{"key":"24_CR8","unstructured":"Hernandez, R., Mj\u00f8lsnes, S.F.: E-wallet Software Architecture with Decentralized Credentials, Norsk Informatikkonferanse, NIK (2003)"},{"issue":"9","key":"24_CR9","doi-asserted-by":"publisher","first-page":"2586","DOI":"10.1109\/TWC.2006.1687783","volume":"5","author":"J.-S. Hwu","year":"2006","unstructured":"Hwu, J.-S., et al.: An Efficient Identity-based Cryptosystem for End-to-End Mobile Security. IEEE Transactions on Wireless Communications\u00a05(9), 2586\u20132593 (2006)","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"3\/4","key":"24_CR10","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1504\/IJSN.2006.011777","volume":"1","author":"J.-S. Hwu","year":"2006","unstructured":"Hwu, J.-S, et al.: End-to-End Security Mechanisms for SMS. International Journal of Security and Networks\u00a01(3\/4), 177\u2013183 (2006)","journal-title":"International Journal of Security and Networks"},{"key":"24_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-3198-2","volume-title":"Elliptic Curve Public Key Cryptosystems","author":"A.J. Menezes","year":"1993","unstructured":"Menezes, A.J.: Elliptic Curve Public Key Cryptosystems. Springer, Heidelberg (1993)"},{"key":"24_CR12","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1023\/A:1021175929111","volume":"8","author":"S.F. Mj\u00f8lsnes","year":"2003","unstructured":"Mj\u00f8lsnes, S.F, Rong, C.: On-Line E-Wallet System with Decentralized Credential Keepers. Mobile Networks and Applications\u00a08, 87\u201399 (2003)","journal-title":"Mobile Networks and Applications"},{"key":"24_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/DEXA.2003.1232060","volume-title":"Proceedings of 14th International Workshop on Database and Expert Systems Applications","author":"M.C. Mont","year":"2003","unstructured":"Mont, M.C, et al.: A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology in a Health Care Trial. In: Ma\u0159\u00edk, V., \u0160t\u011bp\u00e1nkov\u00e1, O., Retschitzegger, W. (eds.) DEXA 2003. LNCS, vol.\u00a02736, pp. 432\u2013437. Springer, Heidelberg (2003)"},{"key":"24_CR14","unstructured":"Organization for Economic Co-operation and Development. OECD Key ICT Indicators (2006), \n                  \n                    www.oecd.org"},{"key":"24_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"24_CR16","unstructured":"Steinsholt, V.: Software Architecture for On-line Electronic Wallet, Master Thesis, Department of Telematics, Norwegian University of Science and Technology (2003)"},{"key":"24_CR17","unstructured":"Voltage Security. \n                  \n                    http:\/\/www.voltage.com\/"}],"container-title":["Lecture Notes in Computer Science","Public Key Infrastructure"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73408-6_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:10:41Z","timestamp":1619518241000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73408-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540734079","9783540734086"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73408-6_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}