{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:55:17Z","timestamp":1725540917711},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642107719"},{"type":"electronic","value":"9783642107726"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10772-6_12","type":"book-chapter","created":{"date-parts":[[2009,11,13]],"date-time":"2009-11-13T07:37:49Z","timestamp":1258097869000},"page":"148-162","source":"Crossref","is-referenced-by-count":0,"title":["An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products"],"prefix":"10.1007","author":[{"given":"Zhen","family":"Zhang","sequence":"first","affiliation":[]},{"given":"K. H. (Kane)","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Myeong-Ho","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Tianran","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Byung-Ho","family":"Chung","sequence":"additional","affiliation":[]},{"given":"Shin-Hyo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Seok-Joon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","first-page":"199","volume-title":"Advances in Cryptology Proceedings of Crypto 1982","author":"D. Chaum","year":"1982","unstructured":"Chaum, D.: Blind Signatures for Untraceable Payments. In: Advances in Cryptology Proceedings of Crypto 1982, pp. 199\u2013203. Plenum Press, New York (1982)"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/0-387-34799-2_25","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"D. Chaum","year":"1990","unstructured":"Chaum, D., Fiat, A., Naor, M.: Untraceable Electronic Cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 319\u2013327. Springer, Heidelberg (1990)"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1007\/3-540-48329-2_26","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"S. Brands","year":"1994","unstructured":"Brands, S.: Untraceable Off-line Cash in Wallet with Observers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 302\u2013318. Springer, Heidelberg (1994)"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1007\/978-3-540-78568-2_51","volume-title":"Database Systems for Advanced Applications","author":"M.Z. Ashrafi","year":"2008","unstructured":"Ashrafi, M.Z., Ng, S.K.: Enabling Privacy-Preserving e-Payment Processing. In: Haritsa, J.R., Kotagiri, R., Pudi, V. (eds.) DASFAA 2008. LNCS, vol.\u00a04947, pp. 596\u2013603. Springer, Heidelberg (2008)"},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable Electronic Mail, Return Address, and Digital Pseudonyms. Communications of the ACM\u00a024, 84\u201390 (1981)","journal-title":"Communications of the ACM"},{"key":"12_CR6","unstructured":"The Boston Globe. Breach of data at TJX is called the biggest ever, \n                    \n                      http:\/\/www.privacy.org\/archives\/2007_03.html"},{"issue":"2","key":"12_CR7","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"12_CR8","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES - The Advanced Encryption Standard","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, Heidelberg (2002)"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1007\/3-540-46766-1_27","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"T. Okamoto","year":"1992","unstructured":"Okamoto, T., Ohta, K.: Universal Electronic Cash. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 324\u2013337. Springer, Heidelberg (1992)"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1007\/3-540-44750-4_35","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"T. Okamoto","year":"1995","unstructured":"Okamoto, T.: An efficient Divisible Electronic Cash Scheme. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 438\u2013451. Springer, Heidelberg (1995)"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1007\/3-540-48285-7_28","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"N. Ferguson","year":"1994","unstructured":"Ferguson, N.: Single Term Off-line Coins. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 318\u2013328. Springer, Heidelberg (1994)"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1007\/11426639_18","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"J. Camenisch","year":"2005","unstructured":"Camenisch, J., Hohenberger, S., Lysyanskaya, A.: Compact e-cash. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 302\u2013321. Springer, Heidelberg (2005)"},{"key":"12_CR13","unstructured":"Danezis, G., Diaz, C.: A Survey of Anonymous Communication Channels. TechReport, Microsoft Research, \n                    \n                      http:\/\/research.microsoft.com\/apps\/pubs\/default.aspx?id=70553"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/BFb0054154","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"A. Chan","year":"1998","unstructured":"Chan, A., Frankel, Y., Tsiounis, Y.: Easy Come - Easy Go Divisible Cash. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 561\u2013575. Springer, Heidelberg (1998)"},{"key":"12_CR15","volume-title":"Proceedings of the 2005 IEEE Symposium on Security and Privacy","author":"S.J. Murdoch","year":"2005","unstructured":"Murdoch, S.J., Danezis, G.: Low-cost traffic analysis of Tor. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, May 2005. IEEE CS, Los Alamitos (2005)"},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/11423409_3","volume-title":"Privacy Enhancing Technologies","author":"G. Danezis","year":"2005","unstructured":"Danezis, G.: The traffic analysis of continuous-time mixes. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol.\u00a03424, pp. 35\u201350. Springer, Heidelberg (2005)"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Frankel, Y., Patt-Shamir, B., Tsiounis, Y.: Exact analysis of exact change. In: Proceedings of the 5th Israeli Symposium on the Thoery of Computing Systems (ISTCS), Ran-Gatan, Israel, June 17-19 (1997)","DOI":"10.1109\/ISTCS.1997.595162"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10772-6_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T11:40:41Z","timestamp":1619782841000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10772-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642107719","9783642107726"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10772-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}