{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:32:18Z","timestamp":1725467538199},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540649519"},{"type":"electronic","value":"9783540539186"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055472","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T09:10:06Z","timestamp":1153991406000},"page":"43-57","source":"Crossref","is-referenced-by-count":4,"title":["A platform for privately defined currencies, loyalty credits, and play money"],"prefix":"10.1007","author":[{"given":"David P.","family":"Maher","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"4_CR1","series-title":"LNCS# 435","first-page":"218","volume-title":"Advances in Cryptology","author":"R.C. Merkle","year":"1990","unstructured":"R.C. Merkle, \u201cA certified Digital Signature\u201d, Advances in Cryptology, Crypto '89 Proceedings, LNCS# 435, G. Brassard (Ed.), Springer, NY, 1990, p. 218."},{"key":"4_CR2","volume-title":"Chapter 7 of Contemporary Cryptology","author":"G.J. Simmons","year":"1992","unstructured":"G.J. Simmons, \u201cA survey of Information Authentication\u201d, Chapter 7 of Contemporary Cryptology, Edited by G.J. Simmons, IEEE Press, New York, 1992."},{"key":"4_CR3","unstructured":"CEN standard 1546-2, \u201cIdentification Card Systems \u2014 Inter-sector electronic purse Part 2: Security Architecture \u201d, European Committee for Standardization, Central Secretariat: rue de Stassart 36, B-1050 Brussels, 1995."},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"D. P. Maher, \u201cCrypto Backup and Key Escrow\u201d, CACM, March 1996.","DOI":"10.1145\/227234.227241"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"M. K. Reiter, \u201cSecure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart\u201d. In Proceedings of the 2nd ACM Conference on Computer and Communications Security, pages 68\u201380, November 1994.","DOI":"10.1145\/191177.191194"},{"key":"4_CR6","volume-title":"LNCS# 1318","author":"D. P. Maher","year":"1997","unstructured":"D. P. Maher, \u201cFault Induction Attacks, Tamper Resistance, and Hostile Reverse Engineering in Perspective\u201d, Proceedings of the 1997 Financial Cryptography Conference, LNCS# 1318, R. Hirschfeld (Ed.), Springer, New York, 1997."}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,11]],"date-time":"2019-02-11T11:18:11Z","timestamp":1549883891000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055472"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540649519","9783540539186"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/bfb0055472","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}