{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:16:08Z","timestamp":1725560168559},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540282242"},{"type":"electronic","value":"9783540317968"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11537878_28","type":"book-chapter","created":{"date-parts":[[2010,7,19]],"date-time":"2010-07-19T18:07:07Z","timestamp":1279562827000},"page":"274-287","source":"Crossref","is-referenced-by-count":1,"title":["An Improved Double Auction Protocol Against False Bids"],"prefix":"10.1007","author":[{"given":"JungHoon","family":"Ha","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianying","family":"Zhou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"SangJae","family":"Moon","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"28_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1007\/BFb0052252","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"J. Camenisch","year":"1997","unstructured":"Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 410\u2013424. Springer, Heidelberg (1997)"},{"key":"28_CR2","volume-title":"The Double Auction Market","author":"D. Friedman","year":"1993","unstructured":"Friedman, D., Rust, J.: The Double Auction Market. Addison-Wesley Publishing Company, Reading (1993)"},{"key":"28_CR3","unstructured":"Ham, W., Kim, K., Imai, H.: Yet Another Strong Sealed-Bid Auctions. In: SCIS 2003, vol.\u00a01\/2, pp. 11\u201316 (2003)"},{"key":"28_CR4","series-title":"Lecture Notes in Computer Science","first-page":"341","volume-title":"Financial Cryptography","author":"H. Kikuchi","year":"2002","unstructured":"Kikuchi, H. (M+1)st-price auction protocol. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol.\u00a02339, p. 341. Springer, Heidelberg (2002)"},{"key":"28_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/3-540-45311-3_16","volume-title":"Progress in Cryptology - INDOCRYPT 2001","author":"B. Lee","year":"2001","unstructured":"Lee, B., Kim, K., Ma, J.: Efficient public auction with one-time registration and public verifiability. In: Pandu Rangan, C., Ding, C. (eds.) INDOCRYPT 2001. LNCS, vol.\u00a02247, p. 162. Springer, Heidelberg (2001)"},{"key":"28_CR6","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/0022-0531(92)90091-U","volume":"56","author":"M. Preston","year":"1992","unstructured":"Preston, M.: A Dominant Strategy Double Auction. Journal of Economic Theory\u00a056, 434\u2013450 (1992)","journal-title":"Journal of Economic Theory"},{"key":"28_CR7","first-page":"241","volume-title":"Proceeding of the 21st International Conference on Distributed Computing Systems","author":"M. Yokoo","year":"2005","unstructured":"Yokoo, M., Sakurai, Y., Matsubara, S.: Robust Double Auction Protocol against False-name Bids. In: Proceeding of the 21st International Conference on Distributed Computing Systems, 2001, pp. 241\u2013252. IEEE Computer Society, Los Alamitos (2005)"},{"key":"28_CR8","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/S0167-9236(03)00142-8","volume":"39","author":"M. Yokoo","year":"2005","unstructured":"Yokoo, M., Sakurai, Y., Matsubara, S.: Robust Double Auction Protocol against False-name Bids. Decision Support Systems\u00a039, 241\u2013252 (2005)","journal-title":"Decision Support Systems"},{"key":"28_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/3-540-47719-5_19","volume-title":"Information Security and Privacy","author":"K. Omote","year":"2001","unstructured":"Omote, K., Miyaji, A.: A practical english auction with one-time registration. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol.\u00a02119, pp. 221\u2013234. Springer, Heidelberg (2001)"},{"key":"28_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/3-540-36159-6_13","volume-title":"Information and Communications Security","author":"K. Peng","year":"2002","unstructured":"Peng, K., Boyd, C., Dawson, E., Viswanathan, K.: Robust, privacy protecting and publicly verifiable sealed-bid auction. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol.\u00a02513, pp. 147\u2013159. Springer, Heidelberg (2002)"},{"issue":"1","key":"28_CR11","doi-asserted-by":"publisher","first-page":"8","DOI":"10.2307\/2977633","volume":"16","author":"W. Vickrey","year":"1961","unstructured":"Vickrey, W.: Counterspeculation, Auction, and Competitive Sealed Tenders. Journal of Finance\u00a016(1), 8\u201337 (1961)","journal-title":"Journal of Finance"},{"key":"28_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-540-24691-6_17","volume-title":"Information Security and Cryptology - ICISC 2003","author":"C. Wang","year":"2004","unstructured":"Wang, C., Leung, F.: Secure Double Auction Protocols with Full Privacy Protection. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol.\u00a02971, pp. 215\u2013229. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy, and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11537878_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:52:53Z","timestamp":1619506373000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11537878_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540282242","9783540317968"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11537878_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}