{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:53:13Z","timestamp":1725551593428},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540307068"},{"type":"electronic","value":"9783540324225"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593980_6","type":"book-chapter","created":{"date-parts":[[2005,11,3]],"date-time":"2005-11-03T07:40:20Z","timestamp":1131003620000},"page":"77-90","source":"Crossref","is-referenced-by-count":1,"title":["A Robust Double Auction Protocol Based on a Hybrid Trust Model"],"prefix":"10.1007","author":[{"given":"JungHoon","family":"Ha","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianying","family":"Zhou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"SangJae","family":"Moon","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-540-45126-6_16","volume-title":"Financial Cryptography","author":"F. Brandt","year":"2003","unstructured":"Brandt, F.: Fully Private Auctions in a Constant Number of Rounds. In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 223\u2013238. Springer, Heidelberg (2003)"},{"unstructured":"Boyd, C., Mao, W.: Security Issues for Electronic Auctions. HPL-2000-90, Hewlett Packard (2000)","key":"6_CR2"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/3-540-46088-8_28","volume-title":"Financial Cryptography","author":"O. Baudron","year":"2002","unstructured":"Baudron, O., Stern, J.: Non-interactive Private Auctions. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol.\u00a02339, pp. 364\u2013378. Springer, Heidelberg (2002)"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/3-540-48071-4_7","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"D. Chaum","year":"1993","unstructured":"Chaum, D., Pedersen, T.P.: Wallet Databases with Observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 89\u2013105. Springer, Heidelberg (1993)"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1007\/BFb0052252","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"J. Camenisch","year":"1997","unstructured":"Camenisch, J., Stadler, M.: Efficient Group Signature Scheme for Large Groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 410\u2013424. Springer, Heidelberg (1997)"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/BFb0054115","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"E. Fujisaki","year":"1998","unstructured":"Fujisaki, E., Okamoto, T.: A Practical and Provably Secure Scheme for Publicly Verifialbe Secret Sharing and its Applications. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 32\u201346. Springer, Heidelberg (1998)"},{"key":"6_CR7","volume-title":"The Double Auction Market","author":"D. Friedman","year":"1993","unstructured":"Friedman, D., Rust, J.: The Double Auction Market. Addison-Wesley Publishing Company, Reading (1993)"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","first-page":"341","volume-title":"Financial Cryptography","author":"H. Kikuchi","year":"2002","unstructured":"Kikuchi, H.: (M+1)st-Price Auction Protocol. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol.\u00a02339, p. 341. Springer, Heidelberg (2002)"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/3-540-45311-3_16","volume-title":"Progress in Cryptology - INDOCRYPT 2001","author":"B. Lee","year":"2001","unstructured":"Lee, B., Kim, K., Ma, J.: Efficient Public Auction with One-Time Registration and Public Verifiability. In: Pandu Rangan, C., Ding, C. (eds.) INDOCRYPT 2001. LNCS, vol.\u00a02247, p. 162. Springer, Heidelberg (2001)"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/0022-0531(92)90091-U","volume":"56","author":"M. Preston","year":"1992","unstructured":"Preston, M.: A Dominant Strategy Double Auction. Journal of Economic Theory\u00a056, 434\u2013450 (1992)","journal-title":"Journal of Economic Theory"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/3-540-47719-5_19","volume-title":"Information Security and Privacy","author":"K. Omote","year":"2001","unstructured":"Omote, K., Miyaji, A.: A Practical English Auctin with One-Time Registration. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol.\u00a02119, pp. 221\u2013234. Springer, Heidelberg (2001)"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1007\/3-540-48405-1_10","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"B. Schoenmakers","year":"1999","unstructured":"Schoenmakers, B.: A Simple Publicly Verifiable Secret Sharing Scheme and its Application to Electronic Voting. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 148\u2013164. Springer, Heidelberg (1999)"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1007\/3-540-68339-9_17","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"M. Stadler","year":"1996","unstructured":"Stadler, M.: Publicly Verifiable Secret Sharing. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 190\u2013199. Springer, Heidelberg (1996)"},{"issue":"1","key":"6_CR14","doi-asserted-by":"publisher","first-page":"8","DOI":"10.2307\/2977633","volume":"16","author":"W. Vickrey","year":"1961","unstructured":"Vickrey, W.: Counterspeculation, Auction, and Competitive Sealed Tenders. Journal of Finance\u00a016(1), 8\u201337 (1961)","journal-title":"Journal of Finance"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-540-24691-6_17","volume-title":"Information Security and Cryptology - ICISC 2003","author":"C. Wang","year":"2004","unstructured":"Wang, C., Leung, F.: Secure Double Auction Protocols with Full Privacy Protection. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol.\u00a02971, pp. 215\u2013229. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593980_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:52:02Z","timestamp":1619506322000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593980_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540307068","9783540324225"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11593980_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}