{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:32:26Z","timestamp":1725467546934},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540649519"},{"type":"electronic","value":"9783540539186"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055470","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T09:10:06Z","timestamp":1153991406000},"page":"16-27","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["X-Cash: Executable digital cash"],"prefix":"10.1007","author":[{"given":"Markus","family":"Jakobsson","sequence":"first","affiliation":[]},{"given":"Ari","family":"Juels","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"2_CR1","volume-title":"Advances in Cryptology \u2014 EUROCRYPT '98, number to be assigned in Lecture Notes in Computer Science","author":"N. Asokan","year":"1998","unstructured":"N. Asokan and Victor Shoup, \u201dOptimistic fair exchange of digital signatures (to appear),\u201d In Kaisa Nyberg, editor, Advances in Cryptology \u2014 EUROCRYPT '98, number to be assigned in Lecture Notes in Computer Science. Springer-Verlag, Berlin Germany, 1998."},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"S. Brands, \u201dUntraceable Off-line Cash in Wallets with Observers,\u201d Advances in Cryptology \u2014 Proceedings of Crypto '93, pp. 302\u2013318.","DOI":"10.1007\/3-540-48329-2_26"},{"key":"2_CR3","unstructured":"S. Brands, \u201dAn Efficient Off-line Electronic Cash Systems Based on the Representation Problem,\u201d C.W.I. Technical Report CS-T9323, The Netherlands."},{"key":"2_CR4","unstructured":"E. Brickell, P. Gemmell and D. Kravitz, \u201dTrustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change,\u201d Proc. 6th Annual ACMSIAM Symposium on Discrete Algorithms (SODA), 1995, pp. 457\u2013466."},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"J. Camenisch, U. Maurer and M. Stadler, \u201dDigital Payment Systems with Passive Anonymity-Revoking Trustees,\u201d Computer Security \u2014 ESORICS 96, volume 1146, pp. 33\u201343.","DOI":"10.1007\/3-540-61770-1_26"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"J. Camenisch, J-M. Piveteau and M. Stadler, \u201dAn Efficient Fair Payment System,\u201d Proceedings of the 3rd ACM Conference on Computer and Communications Security, 1996, pp. 88\u201394.","DOI":"10.1145\/238168.238193"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"D. Chaum, A. Fiat and M. Naor, \u201dUntraceable Electronic Cash,\u201d Advances in Cryptology \u2014 Proceedings of Crypto '88, pp. 319\u2013327.","DOI":"10.1007\/0-387-34799-2_25"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"D. Chaum, \u201dBlind Signatures for Untraceable Payments,\u201d Advances in Cryptology \u2014 Proceedings of Crypto '82, pp. 199\u2013203.","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"D. Chaum, \u201dAchieving Electronic Privacy,\u201d Scientific American, August 1992, pp. 96\u2013101.","DOI":"10.1038\/scientificamerican0892-96"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"D. Chaum and T. Pedersen, \u201dWallet databases with observers,\u201d Advances in Cryptology \u2014 Proceedings of Crypto '92, pp. 89\u2013105.","DOI":"10.1007\/3-540-48071-4_7"},{"key":"2_CR11","unstructured":"CitiBank and S. S. Rosen, \u201dElectronic-Monetary System,\u201d International Publication Number WO 93\/10503; May 27 1993."},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"G.I. Davida, Y. Frankel, Y. Tsiounis, and M. Yung, \u201dAnonymity Control in E-Cash Systems,\u201d Financial Cryptography 97, pp. 1\u201316.","DOI":"10.1007\/3-540-63594-7_63"},{"key":"2_CR13","unstructured":"DigiCash' payment scheme; http:\/\/www.digicash.com"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"N. Ferguson, \u201dExtensions of Single-term Coins,\u201d Advances in Cryptology \u2014 Proceedings of Crypto '93, pp. 292\u2013301.","DOI":"10.1007\/3-540-48329-2_25"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Y. Frankel, Y. Tsiounis, and M. Yung, \u201dIndirect Discourse Proofs: Achieving Efficient Fair Off-Line E-Cash,\u201d Advances in Cryptology \u2014 Proceedings of Asiacrypt 96, pp. 286\u2013300.","DOI":"10.1007\/BFb0034855"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"E. Fujisaki, T. Okamoto, \u201dPractical Escrow Cash System\u201d, LNCS 1189, Proceedings of 1996 Cambridge Workshop on Security Protocols, Springer Verlag, pp. 33\u201348.","DOI":"10.1007\/3-540-62494-5_3"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"S. Glassman, M. Manasse, M. Abadi, P. Gauthier and P. Sobalvarro, \u201dThe Millicent Protocol for Inexpensive Electronic Commerce,\u201d In World Wide Web Journal, Fourth International World Wide Web Conference Proceedings, O'Reilly, December 1995, pp. 603\u2013618.","DOI":"10.1145\/3592626.3592675"},{"key":"2_CR18","unstructured":"R. Hauser, M. Steiner and M. Waidner, \u201dMicropayments Based on iKP,\u201d 14th Worldwide Congress on Computer and Communications Security Protection, 1996, pp. 67\u201384."},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"M. Jakobsson, \u201dRipping Coins for a Fair Exchange,\u201d Advances in Cryptology \u2014 Proceedings of Eurocrypt '95, pp. 220\u2013230.","DOI":"10.1007\/3-540-49264-X_18"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"M. Jakobsson and M. Yung, \u201dRevokable and Versatile Electronic Money,\u201d 3rd ACM Conference on Computer and Communications Security, 1996, pp. 76\u201387.","DOI":"10.1145\/238168.238191"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"M. Jakobsson and M. Yung, \u201dDistributed\u2019 Magic Ink\u2019 Signatures,\u201d Advances in Cryptology \u2014 Proceedings of Eurocrypt '97, pp. 450\u2013464.","DOI":"10.1007\/3-540-69053-0_31"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"M. Jakobsson and M. Yung, \u201dApplying Anti-Trust Policies to Increase Trust in a Versatile E-Money System,\u201d Advances in Cryptology \u2014 Proceedings of Financial Cryptography '97, pp. 217\u2013238.","DOI":"10.1007\/3-540-63594-7_80"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"S. Jarecki and A. Odlyzko, \u201dAn Efficient Micropayment System Based on Probabilistic Polling,\u201d Advances in Cryptology \u2014 Proceedings of Financial Cryptography '97, pp. 173\u2013191.","DOI":"10.1007\/3-540-63594-7_77"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"A. Juels, M. Luby and R. Ostrovsky, \u201dSecurity of Blind Digital Signatures,\u201d Advances in Cryptology \u2014 Proceedings of Crypto '97, pp. 150\u2013164.","DOI":"10.1007\/BFb0052233"},{"key":"2_CR25","unstructured":"C. Jutla and M. Yung, \u201dPaytree:\u2019 Amortized Signature\u2019 for Flexible Micropayments,\u201d 2nd USENIX Workshop on Electronic Commerce, November 1996."},{"key":"2_CR26","unstructured":"D. M'Ra\u00cfhi, \u201dCost-Effective Payment Schemes with Privacy Regulation,\u201d Advances in Cryptology \u2014 Proceedings of Asiacrypt '96."},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"T. Okamoto, \u201dAn Efficient Divisible Electronic Cash Scheme,\u201d Advances in Cryptology \u2014 Proceedings of Crypto '95, pp. 438\u2013451.","DOI":"10.1007\/3-540-44750-4_35"},{"issue":"1","key":"2_CR28","first-page":"7","volume":"2","author":"R. Rivest","year":"1996","unstructured":"R. Rivest and A. Shamir, \u201dPayWord and MicroMint: Two Simple Micropayment Schemes,\u201d Cryptobytes, vol. 2, num. 1, 1996, pp. 7\u201311.","journal-title":"Cryptobytes"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"D. Rus, R. Gray and D. Kotz, \u201dTransportable Information Agents\u201d, 1st Intl. Conf. Autonomous Agents, 1997.","DOI":"10.1145\/267658.267721"},{"key":"2_CR30","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1016\/0167-4048(92)90193-U","volume":"11","author":"S. Solms von","year":"1992","unstructured":"S. von Solms and D. Naccache, \u201dOn Blind Signatures and Perfect Crimes,\u201d Computers and Security, 11 (1992) pp. 581\u2013583.","journal-title":"Computers and Security"},{"key":"2_CR31","series-title":"ETH No. 11651","volume-title":"PhD Thesis","author":"M. Stadler","year":"1996","unstructured":"M. Stadler, \u201dCryptographic Protocols for Revokable Privacy,\u201d PhD Thesis, ETH No. 11651, Swiss Federal Institute of Technology, Z\u00fcrich, 1996."},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"M. Stadler, J-M. Piveteau and J. Camenisch, \u201dFair Blind Signatures,\u201d Advances in Cryptology \u2014 Proceedings of Eurocrypt '95, pp. 209\u2013219.","DOI":"10.1007\/3-540-49264-X_17"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"J. Stern and S. Vaudenay, \u201dSVP: a Flexible Micropayment Scheme,\u201d Advances in Cryptology \u2014 Proceedings of Financial Cryptography '97, pp. 161\u2013171.","DOI":"10.1007\/3-540-63594-7_76"},{"key":"2_CR34","unstructured":"Y. Tsiounis, \u201dEfficient Electronic Cash: New Notions and Techniques,\u201d PhD Thesis, College of Computer Science, Northeastern University, 1997. http:\/\/www.ces.neu.edu\/home\/yiannis"},{"key":"2_CR35","unstructured":"B. Venners, \u201dSolve Real Problems with Aglets, a Type of Mobile Agent,\u201d Javaworld, May 1997."},{"key":"2_CR36","unstructured":"B. Witter, \u201dThe Dark Side of Digital Cash,rd Legal Times, January 30, 1995."},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Y. Yacobi, \u201dOn the Continuum Between On-line and Off-line E-cash Systems \u2014 I,\u201d Advances in Cryptology \u2014 Proceedings of Financial Cryptography '97, pp. 193\u2013201.","DOI":"10.1007\/3-540-63594-7_78"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055470","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,5]],"date-time":"2024-02-05T15:55:43Z","timestamp":1707148543000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055470"}},"subtitle":["Extended abstract"],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540649519","9783540539186"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/bfb0055470","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"28 May 2006","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}