{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:32:29Z","timestamp":1725467549480},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540649519"},{"type":"electronic","value":"9783540539186"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055476","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T05:10:06Z","timestamp":1153977006000},"page":"103-121","source":"Crossref","is-referenced-by-count":3,"title":["A payment scheme using vouchers"],"prefix":"10.1007","author":[{"given":"Ernest","family":"Foo","sequence":"first","affiliation":[]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Martin Abadi and Roger Needham. Prudent Engineering Practice for Cryptographic Protocols. Proceedings of the 1994 IEEE Symposium on Security and Privacy, pages 122\u2013136, May 1994.","DOI":"10.1109\/RISP.1994.296587"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Ross Anderson and Roger Needham. Robustness Principles for Public Key Protocols. In Advances in Cryptology \u2014 Proceedings of CRYPTO '95. Springer-Verlag, 1995.","DOI":"10.1007\/3-540-44750-4_19"},{"key":"8_CR3","unstructured":"Mihir Bellare, Juan A. Garay, Ralf Hauser, Amir Herzberg, Hugo Krawczyk, Micheal Steiner, Gene Tsudik, and Micheal Waidner. iKP \u2014 A Family of Secure Electronic Payment Protocols. In Proceedings of the First Usenix Workshop on Electronic Commerce, New York, July 1995."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjolsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vall\u00e9e, and Michael Waidner. The ESPRIT Project CAFE \u2014 High Security Digital Payment Systems. In Computer Security \u2014 ESORICS '94, pages 217\u2013230. Springer-Verlag, 1994.","DOI":"10.1007\/3-540-58618-0_66"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Stefan Brands. Electronic Cash on the Internet. In Proceedings of the Internet Society 1995 Symposium on Network and Distributed System Security, pages 64\u201384, 1995.","DOI":"10.1109\/NDSS.1995.390644"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"David Chaum. Online Cash Checks. In Advances in Cryptology \u2014 Proceedings of EUROCRYPT '89, pages 288\u2013301, 1989.","DOI":"10.1007\/3-540-46885-4_30"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"David Chaum, Amos Fiat, and Moni Naor. Untraceable Electronic Cash. In Advances in Cryptology \u2014 Proceedings of CRYPTO '88, Lecture Notes in Computer Science, pages 319\u2013327. Springer-Verlag, 1990.","DOI":"10.1007\/0-387-34799-2_25"},{"key":"8_CR8","unstructured":"Benjamin Cox, J. D. Tygar, and Marvin Sirbu. NetBill Security and Transaction Protocol. In Proceedings of the First Usenix Workshop on Electronic Commerce, New York, July 1995."},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Tony Eng and Tatsuaki Okamoto. Single-Term Divisible Electronic Coins. In Advances in Cryptology \u2014 Proceedings of EUROCRYPT '94, number 950 in Lecture Notes in Computer Science, pages 306\u2013319. Springer-Verlag, 1995.","DOI":"10.1007\/BFb0053446"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Niels Ferguson. Single Term Off-Line Coins. In Advances in Cryptology \u2014 Proceedings of EUROCRYPT '93, pages 318\u2013328. Springer-Verlag, 1994.","DOI":"10.1007\/3-540-48285-7_28"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Ernest Foo, Colin Boyd, William Caelli, and Ed Dawson. A Taxonomy of Electronic Cash Schemes. In Proceedings of IFIP\/SEC '97 13th International Information Security Conference, pages 337\u2013348. Chapman and Hall, 1997.","DOI":"10.1007\/978-0-387-35259-6_28"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Matthew Franklin and Moti Yung. Secure and Efficient Off-Line Digital Money. In Proceedings of ICALP '93, number 700 in Lecture Notes in Computer Science, pages 265\u2013276. Springer-Verlag, 1993.","DOI":"10.1007\/3-540-56939-1_78"},{"key":"8_CR13","unstructured":"VISA\/MasterCard International. Secure Electronic Transaction (SET) Specification Book 1: Business Description. http:\/\/www.visa.com\/cgibin\/vee\/sf\/standard.html."},{"key":"8_CR14","unstructured":"VISA\/MasterCard International. Secure Electronic Transaction (SET) Specification Book 2: Programmer's Guide. http:\/\/www.visa.com\/cgibin\/vee\/sf\/standard.html."},{"key":"8_CR15","unstructured":"VISA\/MasterCard International. Secure Electronic Transaction (SET) Specification Book 3: Formal Protocol Definition. http:\/\/www.visa.com\/cgibin\/vee\/sf\/standard.html."},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Markus Jakobsson and Moti Yung. Revokable and Versatile Electronic Money. In Third ACM Conference on Computer and Communications Security, pages 76\u201387. ACM Press, 1996.","DOI":"10.1145\/238168.238191"},{"key":"8_CR17","unstructured":"Wenbo Mao. A Simple Cash Payment Technique for the Internet. In Computer Security \u2014 ESORICS '96. Springer-Verlag, 1996."},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Gennady Medvinsky and B. Clifford Neuman. NetCash: A Design for Practical Electronic Currency on the Internet. In Proceedings of First ACM Conference on Computer and Communications Security, pages 102\u2013196. ACM Press, 1993.","DOI":"10.1145\/168588.168601"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Tatsuaki Okamoto. An Efficient Divisible Electronic Cash Scheme. In Advances in Cryptology \u2014 Proceedings of CRYPTO '95, pages 438\u2013451. Springer-Verlag, 1995.","DOI":"10.1007\/3-540-44750-4_35"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Tatsuaki Okamoto and Kazuo Ohta. Universal Electronic Cash. In Advances in Cryptology \u2014 Proceedings of CRYPTO '91, pages 324\u2013337. Springer-Verlag, 1992.","DOI":"10.1007\/3-540-46766-1_27"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"A. Shamir R. Rivest and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, pages 120\u2013126, 1978.","DOI":"10.1145\/359340.359342"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Ronald L. Rivest and Adi Shamir. PayWord and MicroMint: Two Simple Micropayment Schemes. http:\/\/theory.lcs.mit.edu\/rivest\/RivestShamir-mpay.ps, January 1996.","DOI":"10.1007\/3-540-62494-5_6"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Yacov Yacobi. Efficient Electronic Money. In Advances in Cryptology \u2014 Proceedings of ASIACRYPT '94, pages 153\u2013163. Springer-Verlag, 1995.","DOI":"10.1007\/BFb0000431"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T04:35:02Z","timestamp":1555734902000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055476"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540649519","9783540539186"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/bfb0055476","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}