{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:47:56Z","timestamp":1755838076698,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540425458"},{"type":"electronic","value":"9783540447993"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44799-7_16","type":"book-chapter","created":{"date-parts":[[2007,7,16]],"date-time":"2007-07-16T15:48:52Z","timestamp":1184600932000},"page":"154-165","source":"Crossref","is-referenced-by-count":10,"title":["Cryptographic Protocols for Secure Second-Price Auctions"],"prefix":"10.1007","author":[{"given":"Felix","family":"Brandt","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,16]]},"reference":[{"key":"16_CR1","unstructured":"O. Baudron and J. Stern. Non-interactive private auctions. In Pre-Proceedings of Financial Cryptography 2001, pages 300\u2013313, 2001."},{"key":"16_CR2","series-title":"Lecture Notes in Artificial Intelligence","first-page":"95","volume-title":"Cooperative Information Agents","author":"F. Brandt","year":"2000","unstructured":"F. Brandt, W. Brauer, and G. Wei\u03b2. Task assignment in multiagent systems based on Vickrey-type auctioning and leveled commitment contracting. In M. Klusch and L. Kerschberg, editors, Cooperative Information Agents IV, volume 1860 of Lecture Notes in Artificial Intelligence, pages 95\u2013106, Berlin et al., 2000. Springer-Verlag."},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"F. Brandt and G. Wei\u03b2. Vicious strategies for Vickrey auctions. In Proceedings of the 5th International Conference on Autonomus Agents, pages 71\u201372. ACM Press, 2001.","DOI":"10.1145\/375735.375880"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"K. Danielsen and M. Weiss. User control modes and IP allocation. http:\/\/www.press.umich.edu\/jep\/works\/DanieContr.html , 1995. presented at MIT Workshop on Internet Economics.","DOI":"10.3998\/3336451.0002.112"},{"key":"16_CR5","unstructured":"K.E. Drexler and M.S. Miller. Incentive engineering for computational resource management. In B.A. Huberman, editor, The Ecology of Computation. The Netherlands, 1988."},{"key":"16_CR6","volume-title":"Multi-Agent Systems. An Introduction to Distributed Artificial Intelligence","author":"J. Ferber","year":"1999","unstructured":"J. Ferber. Multi-Agent Systems. An Introduction to Distributed Artificial Intelligence. John Wiley & Sons Inc., New York, 1999."},{"issue":"5","key":"16_CR7","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/32.502223","volume":"22","author":"M.K. Franklin","year":"1996","unstructured":"M.K. Franklin and M.K. Reiter. The design and implementation of a secure auction service. IEEE Trans. on Software Engineering, 22(5):302\u2013312, 1996.","journal-title":"IEEE Trans. on Software Engineering"},{"key":"16_CR8","unstructured":"M. Harkavy, J.D. Tygar, and H. Kikuchi. Electronic auctions with private bids. In Proceedings of the 3rd USENIX Workshop on Electronic Commerce, pages 61\u201374, 1998."},{"key":"16_CR9","first-page":"171","volume-title":"Proceedings of the 1st International Conference on Multiagent Systems (ICMAS-95)","author":"B. Huberman","year":"1995","unstructured":"B. Huberman and S.H. Clearwater. A multiagent system for controlling building environments. In Proceedings of the 1st International Conference on Multiagent Systems (ICMAS-95), pages 171\u2013176, Menlo Park, CA, 1995. AAAI Press."},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"M. Jakobsson and A. Juels. Mix and match: Secure function evaluation via ciphertexts. In Proceedings of Asiacrypt-00, pages 162\u2013177, 2000.","DOI":"10.1007\/3-540-44448-3_13"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"H. Kikuchi. (M+1)st-price auction protocol. In Proceedings of Financial Cryptography (FC 2001), 2001.","DOI":"10.1007\/3-540-46088-8_27"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"H. Kikuchi, S. Hotta, K. Abe, and S. Nakanishi. Resolving winner and winning bid without revealing privacy of bids. In Proceedings of the International Workshop on Next Generation Internet (NGITA), pages 307\u2013312, 2000.","DOI":"10.1109\/PADSW.2000.884610"},{"key":"16_CR13","unstructured":"M. Kudo. Secure electronic sealed-bid auction protocol with public key cryptography. IEICE Trans. Fundamentals, E81-A(1), 1998."},{"key":"16_CR14","first-page":"699","volume":"25","author":"R.P. McAfee","year":"1987","unstructured":"R.P. McAfee and J. McMillan. Auctions and Bidding. Journal of Economic Literature, 25:699\u2013738, 1987.","journal-title":"Journal of Economic Literature"},{"key":"16_CR15","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.2307\/1911865","volume":"50","author":"P.R. Milgrom","year":"1982","unstructured":"P.R. Milgrom and R.J. Weber. A Theory of Auctions and Competitive Bidding. Econometrica, 50:1089\u20131122, 1982.","journal-title":"Econometrica"},{"volume-title":"Foundations of Distributed Artificial Intelligence","year":"1996","key":"16_CR16","unstructured":"G.M.P. O\u2019Hare and N.R. Jennings, editors. Foundations of Distributed Artificial Intelligence. John Wiley\u2019 Sons Inc., New York, 1996."},{"issue":"2","key":"16_CR17","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1086\/296663","volume":"68","author":"M.H. Rothkopf","year":"1995","unstructured":"M.H. Rothkopf and R.M. Harstad. Two models of bid-taker cheating in Vickrey auctions. Journal of Business, 68(2):257\u2013267, 1995.","journal-title":"Journal of Business"},{"issue":"1","key":"16_CR18","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1086\/261670","volume":"98","author":"M.H. Rothkopf","year":"1990","unstructured":"M.H. Rothkopf, T.J. Teisberg, and E.P. Kahn. Why are Vickrey auctions rare? Journal of Political Economy, 98(1):94\u2013109, 1990.","journal-title":"Journal of Political Economy"},{"key":"16_CR19","volume-title":"Proceedings of the 2nd International Conference on Multiagent Systems (ICMAS-96)","author":"T.W. Sandholm","year":"1996","unstructured":"T.W. Sandholm. Limitations of the Vickrey auction in computational multiagent systems. In Proceedings of the 2nd International Conference on Multiagent Systems (ICMAS-96), Menlo Park, CA, 1996. AAAI Press."},{"key":"16_CR20","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir. How to share a secret. Communications of the ACM, 22:612\u2013613, 1979.","journal-title":"Communications of the ACM"},{"key":"16_CR21","unstructured":"D.X. Song and J.K. Millen. Secure auctions in a publish\/subscribe system. Available at http:\/\/www.csl.sri.com\/users\/millen\/ , 2000."},{"issue":"1","key":"16_CR22","doi-asserted-by":"publisher","first-page":"8","DOI":"10.2307\/2977633","volume":"16","author":"W. Vickrey","year":"1961","unstructured":"W. Vickrey. Counter speculation, auctions, and competitive sealed tenders. Journal of Finance, 16(1):8\u201337, 1961.","journal-title":"Journal of Finance"},{"issue":"2","key":"16_CR23","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/32.121753","volume":"18","author":"C.A. Waldspurger","year":"1992","unstructured":".C.A. Waldspurger, T. Hogg, B. Huberman, J.O. Kephart, and W.S. Stornetta. Spawn: A distributed computational economy. IEEE Transactions on Software Engineering, 18(2):103\u2013117, 1992.","journal-title":"IEEE Transactions on Software Engineering"},{"volume-title":"Multiagent Systems. A Modern Approach to Distributed Artificial Intelligence","year":"1999","key":"16_CR24","unstructured":"G. Wei\u03b2, editor. Multiagent Systems. A Modern Approach to Distributed Artificial Intelligence. The MIT Press, Cambridge, MA, 1999."},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"A.C. Yao. How to generate and exchange secrets. In Proceedings of the 27th Symposium on Foundations of Computer Science, pages 162\u2013167. IEEE Computer Society Press, 1986.","DOI":"10.1109\/SFCS.1986.25"}],"container-title":["Lecture Notes in Computer Science","Cooperative Information Agents V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44799-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,19]],"date-time":"2025-01-19T11:38:41Z","timestamp":1737286721000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44799-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540425458","9783540447993"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/3-540-44799-7_16","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}