{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T04:03:25Z","timestamp":1778299405966,"version":"3.51.4"},"reference-count":33,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2001,1]]},"DOI":"10.1016\/s0164-1212(00)00072-8","type":"journal-article","created":{"date-parts":[[2003,4,4]],"date-time":"2003-04-04T21:09:52Z","timestamp":1049490592000},"page":"221-229","source":"Crossref","is-referenced-by-count":34,"title":["A simple micro-payment scheme"],"prefix":"10.1016","volume":"55","author":[{"given":"Min-Shiang","family":"Hwang","sequence":"first","affiliation":[]},{"given":"Iuon-Chang","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Li-Hua","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0164-1212(00)00072-8_BIB1","unstructured":"Anderson, R.J., Kuhn, M.G., 1996. Tamper resistance-a cautionary note. Proceedings of The Second Usenix Workshop on Electronic Commerce, Oakland, California, USA, pp. 1\u201311"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB2","unstructured":"Bellare M. et al., 1995. iKP-A family of Secure Electronic Payment Protocols. IBM; http:\/\/www.zurich.ibm.com\/Technology\/Security\/extern\/ ecommerce\/"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB3","doi-asserted-by":"crossref","unstructured":"Boly, J.P., et al., 1994. The ESPRIT project CAFE \u2013 high security digital payment system. Computer Security \u2013 ESOLICS'94, vol. 875, Nov","DOI":"10.1007\/3-540-58618-0_66"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB4","first-page":"199","article-title":"Blind signatures for untraceable payment","volume":"82","author":"Chaum","year":"1983","journal-title":"Advances in Cryptology-Crypto"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB5","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/0-387-34799-2_25","article-title":"Untraceable electronic cash","volume":"88","author":"Chaum","year":"1990","journal-title":"Advances in Cryptology-Crypto"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB6","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/3-540-48071-4_7","article-title":"Wallet database with observers","volume":"92","author":"Chaum","year":"1993","journal-title":"Advances in Cryptology-Crypto"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB7","unstructured":"Doggest, J., 1995. Electronic check project. Financial Services Technology Consortium (FSTC); http:\/\/macke.wiwi.hu-berlin\/IMI\/micropayments.html"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB8","first-page":"416","article-title":"A design principle for hash functions","volume":"89","author":"Damgard","year":"1990","journal-title":"Advances in Cryptology-Crypto"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB9","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/3-540-39568-7_30","article-title":"A message authentication algorithm suitable for a mainframe computer","volume":"84","author":"Davies","year":"1985","journal-title":"Advances in Cryptology-Crypto"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB10","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/40.502405","article-title":"SCALPS: smart card for limited payment systems","volume":"163","author":"Dhem","year":"1996","journal-title":"IEEE Micro"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB11","unstructured":"Ferreira, L.C., Dahab, R., 1998. A scheme for analyzing electronic payment system. 14th Computer Security Applications Conference, pp. 137\u2013146"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB12","unstructured":"Hauser, R., Steiner, M., Waidner, M., 1996. Micro-payments based on iKP. IBM; http:\/\/www.zurich.ibm.com\/publications\/1996\/HSW96.ps.gz\/"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB13","unstructured":"Hendry, M., 1997. Smart card security and applications. Artech House"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB14","unstructured":"ISO\/IEC 9797, 1989. Data cryptographic techniques \u2013 Data integrity mechanism using a cryptographic check function employing a block cipher algorithm. Internal Organization for Standardization"},{"issue":"2","key":"10.1016\/S0164-1212(00)00072-8_BIB15","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/S0955-1662(98)00008-3","article-title":"Vehicle security using smartcards","volume":"10","author":"Jones","year":"1998","journal-title":"Security Journal"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB16","first-page":"428","article-title":"One way hash function and DES","volume":"89","author":"Merkle","year":"1990","journal-title":"Advances in Cryptology-Crypto"},{"issue":"1","key":"10.1016\/S0164-1212(00)00072-8_BIB17","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/BF00203968","article-title":"A fast software one-way hash function","volume":"3","author":"Merkle","year":"1990","journal-title":"Journal of Cryptology"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB18","unstructured":"Manassee, M., 1995. Millicent (electronic micro-commerce). Digital Equipment Corp"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB19","unstructured":"MasterCard and Visa, 1997a. Secure Electronic Transaction (SET) Specification Book 1: Business Decryption"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB20","unstructured":"MasterCard and Visa, 1997b. Secure Electronic Transaction (SET) Specification Book 2: Programmer's Guide"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB21","doi-asserted-by":"crossref","unstructured":"Naccache, D., M'Raihi, D., 1996. Cryptographic smart cards. IEEE Micro, pp. 14\u201324","DOI":"10.1109\/40.502402"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB22","unstructured":"NIS and NIST FIPS PUB 46-2 Technology, 1993. Data encryption standard. U.S. Department of Commerce"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB23","doi-asserted-by":"crossref","unstructured":"Neumann, C., Medvinsky, G., 1995. Requirements for network payment-the NetCheque perspective. IEEE Compcon","DOI":"10.1109\/CMPCON.1995.512360"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB24","unstructured":"O'Mahony, D., Peirce, M., Tewari, H., 1997. Electronic Payment Systems. Artech House"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB25","doi-asserted-by":"crossref","unstructured":"Rivest, R., Shamir, A., 1997. PayWord and MicroMint: two simple micro payment schemes. MIT Laboratory for Computer Science","DOI":"10.1007\/3-540-62494-5_6"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB26","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signature and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Communication of the ACM"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB27","series-title":"Applied cryptography","author":"Schneier","year":"1996"},{"issue":"4","key":"10.1016\/S0164-1212(00)00072-8_BIB28","doi-asserted-by":"crossref","DOI":"10.1109\/98.403456","article-title":"NetBill: An internet commerce system optimized for network delivered services","volume":"2","author":"Sirbu","year":"1995","journal-title":"IEEE Personal Communications"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB29","doi-asserted-by":"crossref","unstructured":"Sirbu, M., Tygar, J.D., 1995b. NetBill: An electronic commerce system optimized for network delivered information and services. Proceedings of IEEE Compcon'95","DOI":"10.1109\/98.403456"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB30","doi-asserted-by":"crossref","unstructured":"Stern, J., Vaudenay, S., 1997. SVP: A flexible micropayment scheme. LNCS, Proc. Financial Cryptography Workshop","DOI":"10.1007\/3-540-63594-7_76"},{"issue":"2","key":"10.1016\/S0164-1212(00)00072-8_BIB31","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/S0167-4048(98)80004-6","article-title":"Smartcards in secure electronic commerce","volume":"3","author":"Stirland","year":"1998","journal-title":"Information Security Technical Report"},{"key":"10.1016\/S0164-1212(00)00072-8_BIB32","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/S0955-1662(98)00009-5","article-title":"Access contral determination of smart cards using a quantification of security level","volume":"10","author":"Vincent","year":"1998","journal-title":"Security Journal"},{"issue":"10","key":"10.1016\/S0164-1212(00)00072-8_BIB33","first-page":"126","article-title":"Digital cash","volume":"19","author":"Wayner","year":"1994","journal-title":"Byte"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121200000728?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121200000728?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,17]],"date-time":"2020-01-17T06:53:46Z","timestamp":1579244026000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121200000728"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,1]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2001,1]]}},"alternative-id":["S0164121200000728"],"URL":"https:\/\/doi.org\/10.1016\/s0164-1212(00)00072-8","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2001,1]]}}}