{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:58:32Z","timestamp":1743076712306,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540182948"},{"type":"electronic","value":"9783642456282"}],"license":[{"start":{"date-parts":[[1987,1,1]],"date-time":"1987-01-01T00:00:00Z","timestamp":536457600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1987,1,1]],"date-time":"1987-01-01T00:00:00Z","timestamp":536457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1987]]},"DOI":"10.1007\/978-3-642-45628-2_4","type":"book-chapter","created":{"date-parts":[[2012,3,5]],"date-time":"2012-03-05T21:25:11Z","timestamp":1330982711000},"page":"36-50","source":"Crossref","is-referenced-by-count":2,"title":["Verlusttolerante elektronische Brieftaschen"],"prefix":"10.1007","author":[{"given":"Michael","family":"Waidner","sequence":"first","affiliation":[]},{"given":"Birgit","family":"Pfitzmann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"4_CR1","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MC.1983.1654294","volume":"16\/","author":"SG Akl","year":"1983","unstructured":"S. G. Akl: Digital Signatures: A Tutorial Survey; Computer 16\/2 (1983) 15\u201324.","journal-title":"Computer"},{"key":"4_CR2","volume-title":"Fault Tolerance, Principles and Practice","author":"T Anderson","year":"1981","unstructured":"T. Anderson, P.A. Lee: Fault Tolerance, Principles and Practice; Prentice-Hall International, London 1981."},{"key":"4_CR3","unstructured":"H. B\u00fcrk, A. Pfitzmann: Value transfer systems enabling security and unobservability; IFIP\/Sec.\u2019 86, Proc. 4th Intern. Conf. on Computer Security, Monte Carlo, Dez. 1986, erscheint bei North-Holland, 1987."},{"issue":"10","key":"4_CR4","doi-asserted-by":"crossref","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28\/","author":"D Chaum","year":"1985","unstructured":"D. Chaum: Security without Identification: Transaction Systems to make Big Brother Obsolete; CACM 28\/10 (1985) 1030\u20131044.","journal-title":"CACM"},{"key":"4_CR5","volume-title":"Cryptography and Data Security","author":"DE Denning","year":"1982","unstructured":"D. E. Denning: Cryptography and Data Security; Addison-Wesley, Reading 1982."},{"key":"4_CR6","first-page":"199","volume-title":"Electronic Wallet; Proc. 1984 Intern. Zurich Seminar on Digital Communica \u2014 tions","author":"S Even","year":"1984","unstructured":"S. Even, O. Goldreich, Y. Yacobi: Electronic Wallet; Proc. 1984 Intern. Zurich Seminar on Digital Communica \u2014 tions, March 1984, Zurich, Swiss Federal Inst. of Technology, IEEE, 199\u2013201."},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"S. Goldwasser, S. Micali, R. L. Rivest: A \u201cParadoxical\u201d Solution to the Signature Problem; 25th FOCS, Oct. 1984, IEEE Computer Society, 441-448.","DOI":"10.1109\/SFCS.1984.715946"},{"key":"4_CR8","volume-title":"Bibliogr","author":"P Horster","year":"1985","unstructured":"P. Horster: Kryptologie; Reihe Informatik\/47, Bibliogr. Institut, Mannheim 1985."},{"key":"4_CR9","first-page":"363","volume-title":"17th STOC","author":"LA Levin","year":"1985","unstructured":"L. A. Levin: One-way functions and pseudorandom generators; 17th STOC, ACM, New York 1985, 363\u2013365."},{"key":"4_CR10","first-page":"356","volume-title":"18th STOC","author":"M Luby","year":"1986","unstructured":"M. Luby, C. Rackoff: Pseudo random permutation generators and cryptographic composition; 18th STOC, ACM, New York 1986, 356\u2013363."},{"key":"4_CR11","unstructured":"A. Pfitzmann, B. Pfitzmann, M. Waidner: Technischer Datenschutz in diensteintegrierenden Digitalnetzen \u2014 Warum und wie?; DuD Heft 3 (1986) 178-191."},{"issue":"3","key":"4_CR12","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/0167-4048(86)90015-5","volume":"5","author":"GMJ Pluimakers","year":"1986","unstructured":"G. M. J. Pluimakers, J. van Leeuwen: Authentication: A Concise Survey; Computers & Security, North-Holland, 5\/3 (1986) 243\u2013250.","journal-title":"Computers & Security, North-Holland"},{"key":"4_CR13","first-page":"209","volume-title":"Issues in Kernel Design; Operating Systems, An Advanced Course, LNCS 60, Springer-Verlag 1978","author":"GJ Popek","year":"1979","unstructured":"G. J. Popek, C. S. Kline: Issues in Kernel Design; Operating Systems, An Advanced Course, LNCS 60, Springer-Verlag 1978; nachgedruckt als Springer Study Edition, Springer-Verlag, Heidelberg 1979, 209\u2013227."},{"key":"4_CR14","unstructured":"A. Pfitzmann, B. Pfitzmann, M. Waidner: Rechtssicherheit trotz Anonymit\u00e4t in offenen digitalen Systemen; erscheint in Computer und Recht (CR) (1987)."},{"key":"4_CR15","unstructured":"K. Rihaczek: Der Stand von OSIS; DuD Heft 4 (1985) 213-217."},{"key":"4_CR16","unstructured":"F. B. Schneider: Fail-Stop Processors; IEEE Digest of Papers from Spring CompCon\u2019 83, San Francisco, March 1983, 66-70."},{"issue":"1","key":"4_CR17","first-page":"88","volume":"9\/","author":"H Schrenk","year":"1986","unstructured":"H. Schrenk: Neuartiges Chipkartenkonzept mit dem \u201eIntelligenten\u201d Speicher SLE 4401 K; Siemens telcom report, 9\/1 (1986) 88\u201391.","journal-title":"Siemens telcom report"},{"key":"4_CR18","volume-title":"Computer Networks","author":"AS Tanenbaum","year":"1981","unstructured":"A. S. Tanenbaum: Computer Networks; Prentice-Hall, Englewood Cliffs 1981."},{"issue":"2","key":"4_CR19","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/0169-7552(85)90022-4","volume":"9","author":"M Turoff","year":"1985","unstructured":"M. Turoff, S. Chinai: An Electronic Information Marketplace; Computer Networks and ISDN Systems 9\/2 (1985) 79\u201390.","journal-title":"Computer Networks and ISDN Systems"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"M. Waidner, B. Pfitzmann: Anonyme und verlusttolerante elektronische Brieftaschen; Interner Bericht 1\/87 der Fakult\u00e4t f\u00fcr Informatik, Univ. Karlsruhe 1987.","DOI":"10.1007\/978-3-642-45628-2_4"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"S. B. Weinstein: Smart credit cards: the answer to cashless shopping; IEEE Spectrum Feb. (1984) 43-49.","DOI":"10.1109\/MSPEC.1984.6370176"}],"container-title":["Informatik-Fachberichte","Fehlertolerierende Rechensysteme \/ Fault-Tolerant Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-45628-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T15:49:56Z","timestamp":1714751396000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-45628-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1987]]},"ISBN":["9783540182948","9783642456282"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-45628-2_4","relation":{},"ISSN":["0343-3005"],"issn-type":[{"type":"print","value":"0343-3005"}],"subject":[],"published":{"date-parts":[[1987]]}}}