{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T14:29:41Z","timestamp":1758637781463},"reference-count":52,"publisher":"Elsevier","license":[{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1016\/s0065-2458(00)80009-1","type":"book-chapter","created":{"date-parts":[[2008,9,15]],"date-time":"2008-09-15T07:23:07Z","timestamp":1221463387000},"page":"425-449","source":"Crossref","is-referenced-by-count":18,"title":["State of the art in electronic payment systems"],"prefix":"10.1016","author":[{"given":"N.","family":"Asokan","sequence":"first","affiliation":[]},{"given":"P.","family":"Janson","sequence":"additional","affiliation":[]},{"given":"M.","family":"Steiner","sequence":"additional","affiliation":[]},{"given":"M.","family":"Waidner","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"9","key":"10.1016\/S0065-2458(00)80009-1_bib1","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/2.612244","article-title":"State of the art in electronic payment systems","volume":"30","author":"Asokan","year":"1997","journal-title":"IEEE Computer."},{"key":"10.1016\/S0065-2458(00)80009-1_bib2","article-title":"Fault Tolerance\u2014Principles and Practice","volume":"Vol. 3","author":"Lee","year":"1990"},{"key":"10.1016\/S0065-2458(00)80009-1_bib3","series-title":"Advances in Cryptology-CRYPTO'88","first-page":"319","article-title":"Untraceable electronic cash","volume":"403","author":"Chaum","year":"1990"},{"key":"10.1016\/S0065-2458(00)80009-1_bib4","series-title":"Advances in Cryptology-CRYPTO '93","first-page":"302","article-title":"Untraceable off-line cash in wallet with observers","volume":"773","author":"Brands","year":"1993"},{"key":"10.1016\/S0065-2458(00)80009-1_bib5","series-title":"2nd USENIX Workshop on Electronic Commerce","first-page":"1","article-title":"Tamper resistance\u2014a cautionary note","author":"Anderson","year":"1996"},{"key":"10.1016\/S0065-2458(00)80009-1_bib6","series-title":"Eurocrypt '97","first-page":"37","article-title":"On the importance of checking cryptographic protocols for faults","volume":"1233","author":"Boneh","year":"1997"},{"key":"10.1016\/S0065-2458(00)80009-1_bib7","series-title":"Advances in Cryptology\u2014CRYPTO '99","first-page":"399","article-title":"Differential power analysis","volume":"1666","author":"Kocher","year":"1999"},{"key":"10.1016\/S0065-2458(00)80009-1_bib8","series-title":"2nd Advanced Encryption Standard (AES) Candidate Conference","article-title":"A cautionary note regarding evaluation of AES candidates on smart-cards","author":"Chari","year":"1999"},{"key":"10.1016\/S0065-2458(00)80009-1_bib9","series-title":"Advances in Cryptology\u2014CRYPTO '99","first-page":"398","article-title":"Towards sound approaches to counteract power-analysis attacks","volume":"1666","author":"Chari","year":"1999"},{"issue":"2","key":"10.1016\/S0065-2458(00)80009-1_bib10","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/2.566159","article-title":"Trusting mobile user devices and security modules","volume":"30","author":"Pfitzmann","year":"1997","journal-title":"IEEE Computer"},{"key":"10.1016\/S0065-2458(00)80009-1_bib11","author":"National Institute of Standards Technology","year":"1999","journal-title":"Data Encryption Standard (DES). Federal Information Processing Standards Publication 46-3 (FIPS PUB 46-3), November"},{"issue":"11","key":"10.1016\/S0065-2458(00)80009-1_bib12","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/188280.188291","article-title":"Why cryptosystems fail","volume":"37","author":"Anderson","year":"1994","journal-title":"Communications of the ACM"},{"issue":"2","key":"10.1016\/S0065-2458(00)80009-1_bib13","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Journal of the ACM"},{"key":"10.1016\/S0065-2458(00)80009-1_bib14","series-title":"Smartcard 2000","first-page":"69","article-title":"Privacy protected payments: Unconditional payer and\/or payee untraceability","author":"Chaum","year":"1989"},{"issue":"4","key":"10.1016\/S0065-2458(00)80009-1_bib15","doi-asserted-by":"crossref","DOI":"10.1109\/49.839936","article-title":"Design, implementation and deployment of a secure, account-based electronic payment system","volume":"18","author":"Bellare","year":"1999","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"6","key":"10.1016\/S0065-2458(00)80009-1_bib16","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/228503.228510","article-title":"Perils and pitfalls of practical cybercommerce","volume":"39","author":"Borenstein","year":"1996","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0065-2458(00)80009-1_bib17","series-title":"IEEE COMPCON '95","article-title":"Payment switches for open networks","author":"Gifford","year":"1995"},{"key":"10.1016\/S0065-2458(00)80009-1_bib18","article-title":"The electronic check architecture","volume":"September","author":"Anderson","year":"1998"},{"key":"10.1016\/S0065-2458(00)80009-1_bib19","series-title":"FSML\u2014Financial service markup language","volume":"October","year":"1998"},{"key":"10.1016\/S0065-2458(00)80009-1_bib20","year":"1997","journal-title":"SET Secure Electronic Transactions Protocol"},{"key":"10.1016\/S0065-2458(00)80009-1_bib21","series-title":"Proceedings of the 3rd European Symposium on Research in Computer Security (ESORICS)","article-title":"The ESPRIT project CAFE\u2014high security digital payment systems","volume":"875","author":"Boly","year":"1994"},{"key":"10.1016\/S0065-2458(00)80009-1_bib22","series-title":"1st ACM Conference on Computer and Communications Security","first-page":"102","article-title":"NetCash: A design for practical electronic currency on the internet","author":"Medvinsky","year":"1993"},{"issue":"5","key":"10.1016\/S0065-2458(00)80009-1_bib23","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1016\/0167-4048(89)90022-9","article-title":"Digital payment systems enabling security and unobservability","volume":"8","author":"B\u00fcrk","year":"1989","journal-title":"Computers and Security"},{"key":"10.1016\/S0065-2458(00)80009-1_bib24","series-title":"2nd ACM Conference on Computer and Communications Security","first-page":"108","article-title":"Anonymous credit cards","author":"Low","year":"1994"},{"key":"10.1016\/S0065-2458(00)80009-1_bib25","series-title":"1st USENIX Workshop on Electronic Commerce","article-title":"NetBill security and transaction protocol","author":"Cox","year":"1995"},{"key":"10.1016\/S0065-2458(00)80009-1_bib26","series-title":"Cambridge Workshop on Security Protocols","first-page":"59","article-title":"Electronic payments of small amounts","volume":"1189","author":"Pedersen","year":"1996"},{"key":"10.1016\/S0065-2458(00)80009-1_bib27","series-title":"4th International Conference on the World-Wide Web","article-title":"The MilliCent protocol for inexpensive electronic commerce","author":"Glassman","year":"1995"},{"key":"10.1016\/S0065-2458(00)80009-1_bib28","article-title":"Micro-payments based on iKP","volume":"February","author":"Hauser","year":"1996"},{"key":"10.1016\/S0065-2458(00)80009-1_bib29","series-title":"6th International Conference on the World-Wide Web","article-title":"Mini-pay: Charging per click on the web","author":"Herzberg","year":"1997"},{"issue":"2","key":"10.1016\/S0065-2458(00)80009-1_bib30","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1145\/253145.253282","article-title":"Strong loss tolerance of electronic coin systems","volume":"15","author":"Pfitzmann","year":"1997","journal-title":"ACM Transactions on Computer Systems"},{"key":"10.1016\/S0065-2458(00)80009-1_bib31","series-title":"3rd ACM Conference on Computer and Communications Security","first-page":"76","article-title":"Revokable and versatile electronic money","author":"Jakobsson","year":"1996"},{"key":"10.1016\/S0065-2458(00)80009-1_bib32","series-title":"Asiacrypt '96","first-page":"286","article-title":"Indirect discourse proofs: achieving efficient fair off-line e-cash","volume":"1163","author":"Frankel","year":"1996"},{"key":"10.1016\/S0065-2458(00)80009-1_bib33","series-title":"4th European Symposium on Research in Computer Security (ESORICS '96)","first-page":"33","article-title":"Digital payment systems with passive anonymity-revoking trustees","volume":"1146","author":"Camenisch","year":"1996"},{"issue":"6","key":"10.1016\/S0065-2458(00)80009-1_bib34","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1016\/0167-4048(92)90193-U","article-title":"On blind signatures and perfect crimes","volume":"11","author":"von Solms","year":"1992","journal-title":"Computers and Security"},{"key":"10.1016\/S0065-2458(00)80009-1_bib35","series-title":"1st International Conference on Information and Communications Security (ICICS)","first-page":"463","article-title":"Efficient scalable fair cash with off-line extortion prevention","volume":"1334","author":"Petersen","year":"1997"},{"key":"10.1016\/S0065-2458(00)80009-1_bib36","series-title":"Cambridge Workshop on Security Protocols","first-page":"69","article-title":"PayWord and MicroMint: Two simple micropayment schemes","volume":"1189","author":"Rivest","year":"1996"},{"key":"10.1016\/S0065-2458(00)80009-1_bib37","series-title":"Cambridge Workshop on Security Protocols","article-title":"NetCard\u2014a practical electronic cash system","volume":"1189","author":"Anderson","year":"1996"},{"key":"10.1016\/S0065-2458(00)80009-1_bib38","doi-asserted-by":"crossref","unstructured":"Schunter, M. Fair exchange: A new paradigm for e-commerce. SEMPER\u2014Secure Electronic Marketplace for Europe. Lecture Notes in Computer Science, ed. G. Lacoste, B. Pfitzmann, M. Steiner, and M. Waidner, Springer-Verlag, Berlin (to appear).","DOI":"10.1007\/0-387-23483-7_155"},{"key":"10.1016\/S0065-2458(00)80009-1_bib39","series-title":"2nd USENIX Workshop on Electronic Commerce","first-page":"87","article-title":"Generic electronic payment services: Framework and functional specification","author":"Bahreman","year":"1996"},{"key":"10.1016\/S0065-2458(00)80009-1_bib40","series-title":"2nd USENIX Workshop on Electronic Commerce","first-page":"105","article-title":"U-PAI: A universal payment application interface","author":"Ketchpel","year":"1996"},{"key":"10.1016\/S0065-2458(00)80009-1_bib41","series-title":"The Java Wallet (TM) architecture white paper, March","author":"Sun Microsystems","year":"1998"},{"key":"10.1016\/S0065-2458(00)80009-1_bib42","article-title":"Designing a generic payment service","author":"Abad-Peiro","year":"1996"},{"issue":"1","key":"10.1016\/S0065-2458(00)80009-1_bib43","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1147\/sj.371.0072","article-title":"Designing a generic payment service","volume":"37","author":"Abad-Peiro","year":"1998","journal-title":"IBM Systems Journal"},{"key":"10.1016\/S0065-2458(00)80009-1_bib44","unstructured":"Asokan, N. and Steiner, M. The payment framework. SEMPER\u2014Secure Electronic Marketplace for Europe. Lecture Notes in Computer Science, ed. G. Lacoste, B. Pfitzmann, M. Steiner, and M. Waidner, Springer-Verlag, Berlin, (to appear)."},{"key":"10.1016\/S0065-2458(00)80009-1_bib45","article-title":"Properties of payment systems\u2014general definition sketch and classification","author":"Pfitzmann","year":"1996"},{"key":"10.1016\/S0065-2458(00)80009-1_bib46","series-title":"3rd USENIX Workshop on Electronic Commerce","first-page":"187","article-title":"Towards a framework for handling disputes in payment systems","author":"Asokan","year":"1998"},{"issue":"2","key":"10.1016\/S0065-2458(00)80009-1_bib47","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1038\/scientificamerican0899-32","article-title":"How to steal millions in chump change","volume":"281","author":"Wallich","year":"1999","journal-title":"Scientific American"},{"key":"10.1016\/S0065-2458(00)80009-1_bib48","author":"Schneier","year":"1996"},{"key":"10.1016\/S0065-2458(00)80009-1_bib49","author":"Menezes","year":"1997"},{"key":"10.1016\/S0065-2458(00)80009-1_bib50","article-title":"HMAC: Keyed-hashing for message authentication","author":"Bellare","year":"1997","journal-title":"Internet RFC 2104, February"},{"key":"10.1016\/S0065-2458(00)80009-1_bib51","first-page":"180","article-title":"Secure hash standard","author":"NIST","year":"1995"},{"issue":"8","key":"10.1016\/S0065-2458(00)80009-1_bib52","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1016\/S1389-1286(98)00020-6","article-title":"Authenticating public terminals","volume":"31","author":"Asokan","year":"1999","journal-title":"Computer Networks"}],"container-title":["Advances in Computers","Emphasizing Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0065245800800091?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0065245800800091?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T00:41:38Z","timestamp":1557794498000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0065245800800091"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1016\/s0065-2458(00)80009-1","relation":{},"ISSN":["0065-2458"],"issn-type":[{"value":"0065-2458","type":"print"}],"subject":[],"published":{"date-parts":[[2000]]}}}