{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:50:33Z","timestamp":1725457833285},"publisher-location":"Boston","reference-count":17,"publisher":"Kluwer Academic Publishers","isbn-type":[{"type":"print","value":"0792375297"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-306-47009-8_32","type":"book-chapter","created":{"date-parts":[[2005,12,19]],"date-time":"2005-12-19T11:07:01Z","timestamp":1134990421000},"page":"445-457","source":"Crossref","is-referenced-by-count":0,"title":["Trading among Untrusted Partners via Voucher Trading System"],"prefix":"10.1007","author":[{"given":"Ko","family":"Fujimura","sequence":"first","affiliation":[]},{"given":"Masayuki","family":"Terada","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"D. Burdett, \u201cInternet Open Trading Protocol \u2014 IOTP Version 1.0,\u201d RFC 2801, IETF, 2000.","DOI":"10.17487\/rfc2801"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"D. Eastlake, J. Reagle, D. Sole, et al., \u201cXML-Signature Syntax and Processing,\u201d W3C Candidate Recommendation, W3C, < http:\/\/www.w3.org\/TR\/xmldsig-core\/ >, 2000.","DOI":"10.17487\/rfc3075"},{"key":"32_CR3","unstructured":"A. Freier, P. Karlton, and P. Kosher, \u201cThe SSL Protocol Version 3.0,\u201d IETF Internet Draft, < http:\/\/home.netscape.com\/eng\/ssl3\/draft302.txt >, 1996."},{"key":"32_CR4","unstructured":"K. Fujimura, \u201cRequirements for Generic Voucher Trading,\u201d IETF Internet Draft, draft-ietf-trade-drt-requirements-02.txt, 2001."},{"key":"32_CR5","unstructured":"K. Fujimura and M. Terada, \u201cXML Voucher: Generic Voucher Language,\u201d IETF Internet Draft, draft-ietf-trade-voucher-lang-0 1.txt, 2001."},{"key":"32_CR6","unstructured":"K. Fujimura and Y. Nakajima, \u201cGeneral-purpose Digital Ticket Framework,\u201d 3rd USENIX Workshop on Electronic Commerce, pp. 177\u2013186, 1998."},{"key":"32_CR7","unstructured":"K. Fujimura, H. Kuno, M. Terada, K. Matsuyama, Y. Mizuno, and J. Sekine, \u201cDigital-Ticket-Controlled Digital Ticket Circulation,\u201d 8th USENUX Security Symposium, pp. 229\u2013238, 1999."},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"I. Grigg, \u201cFinancial Cryptography in 7 Layers,\u201d Pre-proceedings of the Fourth Annual Conference of Financial Cryptography, 2000.","DOI":"10.1007\/3-540-45472-1_23"},{"key":"32_CR9","unstructured":"R. A. Hettinga, \u201cA Market Model for Digital Bearer Instrument Underwriting,\u201d < http:\/\/llwww.philodox.com\/modelpaper.html >, 1998."},{"key":"32_CR10","unstructured":"G. Howland, \u201cDevelopment of an Qpen and Flexible Payment System,\u201d Systemics Ltd., < http:\/\/www.systemics.corn\/docs\/sox\/overview.html >"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"G. Lacoste, B. Pfitzrnann, M. Steiner, and M. Waidner (Eds.), \u201cSEMPER-Secure Electronic Marketplace for Europe,\u201d LNCS 1854, Springer-Verlag, 2000.","DOI":"10.1007\/b75215"},{"key":"32_CR12","unstructured":"MANDATE II Consortium, \u201cMANDATE final report,\u201d Draft version 2.0, 1998."},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"K. Matsuyama and K. Fujimura, \u201cDistributed Digital\u2014Ticket Management for Rights Trading System,\u201d 1st ACM Conferences on Electronic Commerce, pp. 110\u2013118, 1999.","DOI":"10.1145\/336992.337020"},{"key":"32_CR14","unstructured":"A. Schmidt\u2019 \u201cTEDIS II \u2014 EDICON final report,\u201d 1997."},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"M. Terada, H. Kuno, M. Hanadate, and K. Fujimura, \u201cCopy Prevention Scheme for Right Trading Infrastructure,\u201d 4th Smart Card Research and Advanced Application Conference (CARDIS), IFIP 52, Kluwer Academic Publishers, 2000.","DOI":"10.1007\/978-0-387-35528-3_4"},{"key":"32_CR16","doi-asserted-by":"crossref","unstructured":"R. Thayer, N. Doraswamy, and R. Glenn, \u201cIP Security Document Roadmap,\u201d RF62411, IETF, 1998.","DOI":"10.17487\/rfc2411"},{"key":"32_CR17","unstructured":"P. Wayner, \u201cDigital Cash,\u201d Academic Press Ltd., 1997."}],"container-title":["IFIP International Federation for Information Processing","Towards the E-Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-306-47009-8_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T00:52:53Z","timestamp":1619484773000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-306-47009-8_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["0792375297"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/0-306-47009-8_32","relation":{},"subject":[]}}