{"id":"https://openalex.org/W1627776661","doi":"https://doi.org/10.1007/978-3-540-73458-1_31","title":"Practical Compact E-Cash","display_name":"Practical Compact E-Cash","publication_year":2007,"publication_date":"2007-07-04","ids":{"openalex":"https://openalex.org/W1627776661","doi":"https://doi.org/10.1007/978-3-540-73458-1_31","mag":"1627776661"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-73458-1_31","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-73458-1_31","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027786039","display_name":"Man Ho Au","orcid":"https://orcid.org/0000-0003-2068-9530"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Man Ho Au","raw_affiliation_strings":["Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Australia","Centre for Computer and Information Security Research, School of Computer Science and Software Engineering; University of Wollongong; Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering; University of Wollongong; Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Australia","Centre for Computer and Information Security Research, School of Computer Science and Software Engineering; University of Wollongong; Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering; University of Wollongong; Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008178136","display_name":"Yi Mu","orcid":"https://orcid.org/0000-0002-1637-845X"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yi Mu","raw_affiliation_strings":["Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Australia","Centre for Computer and Information Security Research, School of Computer Science and Software Engineering; University of Wollongong; Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering; University of Wollongong; Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5027786039"],"corresponding_institution_ids":["https://openalex.org/I204824540"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":2.9769,"has_fulltext":false,"cited_by_count":42,"citation_normalized_percentile":{"value":0.92525651,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"431","last_page":"445"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.6344026327133179},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5919584631919861},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.5911872386932373},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5725430250167847},{"id":"https://openalex.org/keywords/cash","display_name":"Cash","score":0.5541102290153503},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35436350107192993},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.19963037967681885},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.12767887115478516},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.10033708810806274},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.0648723840713501}],"concepts":[{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.6344026327133179},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5919584631919861},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.5911872386932373},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5725430250167847},{"id":"https://openalex.org/C2778083465","wikidata":"https://www.wikidata.org/wiki/Q693464","display_name":"Cash","level":2,"score":0.5541102290153503},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35436350107192993},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.19963037967681885},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.12767887115478516},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.10033708810806274},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.0648723840713501},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-540-73458-1_31","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-73458-1_31","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.4699999988079071,"id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1482953431","https://openalex.org/W1494775996","https://openalex.org/W1507359370","https://openalex.org/W1521092767","https://openalex.org/W1523567567","https://openalex.org/W1533716120","https://openalex.org/W1550793461","https://openalex.org/W1601001795","https://openalex.org/W1610688607","https://openalex.org/W1851031742","https://openalex.org/W1885156594","https://openalex.org/W1888254701","https://openalex.org/W2031618446","https://openalex.org/W2076158628","https://openalex.org/W2098104887","https://openalex.org/W2117797270","https://openalex.org/W2129769253","https://openalex.org/W2135267968","https://openalex.org/W2137664544","https://openalex.org/W2165297797","https://openalex.org/W2172174332","https://openalex.org/W2561675875","https://openalex.org/W2913105718","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2073713056","https://openalex.org/W3110702597","https://openalex.org/W2125620709","https://openalex.org/W2110441383","https://openalex.org/W2045932760","https://openalex.org/W4233149903","https://openalex.org/W2326878701","https://openalex.org/W4293864700","https://openalex.org/W2184228419","https://openalex.org/W67445448"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
