{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:34:59Z","timestamp":1743082499346,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642275845"},{"type":"electronic","value":"9783642275852"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27585-2_1","type":"book-chapter","created":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T22:38:29Z","timestamp":1328654309000},"page":"1-14","source":"Crossref","is-referenced-by-count":20,"title":["Evoking Comprehensive Mental Models of Anonymous Credentials"],"prefix":"10.1007","author":[{"given":"Erik","family":"W\u00e4stlund","sequence":"first","affiliation":[]},{"given":"Julio","family":"Angulo","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Brands, S.: Rethinking Public Key Infrastructure and Digital certificates - Building in Privacy. Ph.D. thesis, Eindhoven. Institute of Technology (1999)","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J. Camenisch","year":"2001","unstructured":"Camenisch, J., Lysyanskaya, A.: An Efficient System for Non-Transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 93\u2013118. Springer, Heidelberg (2001)"},{"key":"1_CR3","unstructured":"Camenisch, J., Crane, S., Fischer-H\u00fcbner, S., Leenes, R., Pearson, S., Pettersson, J.S., Sommer, D., Andersson, C.: Trust in PRIME. In: Proceedings of Fifth IEEE International Symposium on Signal Processing and Information Technology, pp. 552\u2013559 (December 2005)"},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/1179529.1179536","volume-title":"Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006","author":"J. Camenisch","year":"2006","unstructured":"Camenisch, J., Shelat, A., Sommer, D., Zimmermann, R.: Securing user inputs for the web. In: Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006, pp. 33\u201344. ACM, New York (2006)"},{"issue":"10","key":"1_CR5","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM\u00a028(10), 1030\u20131044 (1985)","journal-title":"Communications of the ACM"},{"key":"1_CR6","volume-title":"Mental models: towards a cognitive science of language, inference, and consciousness","author":"P.N. Johnson-Laird","year":"1983","unstructured":"Johnson-Laird, P.N.: Mental models: towards a cognitive science of language, inference, and consciousness. Harvard University Press, Cambridge (1983)"},{"key":"1_CR7","first-page":"182","volume-title":"The First International Conference on Computer Support for Collaborative Learning, CSCL 1995","author":"D.H. Jonassen","year":"1995","unstructured":"Jonassen, D.H.: Operationalizing mental models: strategies for assessing mental models to support meaningful learning and design-supportive learning environments. In: The First International Conference on Computer Support for Collaborative Learning, CSCL 1995, pp. 182\u2013186. L. Erlbaum Associates Inc., Hillsdale (1995)"},{"key":"1_CR8","unstructured":"Pettersson, J.S.: HCI Guidelines. PRIME deliverable D6.1.f (February 2008)"},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/1073001.1073007","volume-title":"Proceedings of the 2005 Symposium on Usable Privacy and Security, SOUPS 2005","author":"J.S. Pettersson","year":"2005","unstructured":"Pettersson, J.S., Fischer-H\u00fcbner, S., Danielsson, N., Nilsson, J., Bergmann, M., Clauss, S., Kriegelstein, T., Krasemann, H.: Making PRIME usable. In: Proceedings of the 2005 Symposium on Usable Privacy and Security, SOUPS 2005, pp. 53\u201364. ACM, New York (2005)"},{"key":"1_CR10","first-page":"229","volume-title":"Privacy and Identity Management for Life","author":"E. W\u00e4stlund","year":"2011","unstructured":"W\u00e4stlund, E., Fischer-H\u00fcbner, S.: The Users\u2019 Mental Models\u2019 Effect on their Comprehension of Anonymous Credentials. In: Privacy and Identity Management for Life, pp. 229\u2013240. Springer, Heidelberg (2011)"},{"key":"1_CR11","unstructured":"Whitten, A., Tygar, J.D.: Why Johnny Can\u2019t Encrypt: A Usability Evaluation of PGP 5.0. In: Proceedings of the 8th USENIX Security Symposium (1999)"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Young, I.: Mental Models: Aligning Design Strategy with Human Behavior. Rosenfeld media (2008)","DOI":"10.1145\/1376142.1376141"}],"container-title":["Lecture Notes in Computer Science","Open Problems in Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27585-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T00:06:23Z","timestamp":1584403583000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27585-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642275845","9783642275852"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27585-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}