{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T03:40:20Z","timestamp":1737171620989,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540441106"},{"type":"electronic","value":"9783540461210"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-46121-3_18","type":"book-chapter","created":{"date-parts":[[2007,7,2]],"date-time":"2007-07-02T18:07:47Z","timestamp":1183399667000},"page":"161-169","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Fair Exchange under Limited Trust"],"prefix":"10.1007","author":[{"given":"Chihiro","family":"Ito","sequence":"first","affiliation":[]},{"given":"Mizuho","family":"Iwaihara","sequence":"additional","affiliation":[]},{"given":"Yahiko","family":"Kambayashi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,8,23]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"N. Asokan, M. Schunter, and M. Waidner, \u201cOptimistic Protocols for Fair Exchange\u201d, Proc. 4th ACM Conf. on Computer and Communications Security, pp. 6\u201317, Z\u00fcrich, Switzerland, April 1997.","DOI":"10.1145\/266420.266426"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"M. K. Franklin, M. K. Reiter, \u201cFair Exchange with a Semi-Trusted Third Party\u201d, Proc. 4th ACM Conf. on Computer and Communication Security, April 1997.","DOI":"10.1145\/266420.266424"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"F. C. G\u00e4rtner, H. Pagnia, and H. Vogt, \u201cApproaching a Formal Definition of Fairness in Electronic Commerce\u201d, Proc. International Workshop on Electronic Commerce (WELCOM\u201999), pp. 354\u2013359, Lausanne, Switzerland, Oct, 1999.","DOI":"10.1109\/RELDIS.1999.805123"},{"key":"18_CR4","unstructured":"S. P. Ketchpel, H. Garcia-Monia, \u201cMaking Trust Explicit in Distributed Commerce Transactions\u201d, Proc. 16th ICDCS, pp. 270\u2013281, Hong Kong, May 1996."},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"D. W Manchala, \u201cTrust Metrics, Models and Protocols for Electronic Commerce Transactions\u201d Proc. 18th ICDCS, pp. 312\u2013321, Amsterdam, May 1998.","DOI":"10.1109\/ICDCS.1998.679731"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"H. Pagnia, H. Vogt, F. C. G\u00e4rtner, and U. G. Wilhelm, \u201cSolving Fair Exchange with Mobile Agents\u201d, Proc. 2nd ASA\/MA, pp. 57\u201372, 2000.","DOI":"10.1007\/978-3-540-45347-5_6"},{"key":"18_CR7","unstructured":"T. W. Sandholm and V. R. Lesser, \u201cEquilibrium analysis of the possibilities of unenforced exchange in multiagent systems\u201d, Proc. 14th International Joint Conf. on Artificial Intelligence, pp. 694\u2013703, San Mateo, August 1995."},{"key":"18_CR8","unstructured":"J. Su, D. Manchala, \u201cBuilding Trust for Distributed Commerce Transactions\u201d, Proc. 17th ICDCS, pp. 322\u2013329, Baltimore, May 1997."},{"key":"18_CR9","unstructured":"J. Su, D. Manchala, \u201cTrust Vs. Threats: Recovery and Survival in Electronic Commerce\u201d, Proc. 19th ICDCS, pp. 126\u2013133, 1999."},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"H. Vogt, H. Pagnia, and F. C. G\u00e4rtner \u201cModular Fair Exchange Protocols for Electronic Commerce\u201d, Proc. 15th Annual Computer Security Applications Conf., pp. 3\u201311, Phoenix, December 1999.","DOI":"10.1109\/CSAC.1999.816008"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"H. Vogt, H. Pagnia, and F. C. G\u00e4rtner, \u201cUsing Smart Cards for Fair Exchange\u201d, Proc. International Workshop on Electronic Commerce (WELCOM 2001), pp. 101\u2013113, Heidelberg, Germany, November 2001.","DOI":"10.1007\/3-540-45598-1_11"},{"key":"18_CR12","unstructured":"U. G. Wilhelm, L. Butty\u00e1n, and S. Staamann, \u201cOn the Problem of Trust in Mobile Agent Systems\u201d, Symp. on Network and Distributed System Security, pp. 114\u2013124, March 1998."}],"container-title":["Lecture Notes in Computer Science","Technologies for E-Services"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46121-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T03:02:05Z","timestamp":1737169325000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46121-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540441106","9783540461210"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-46121-3_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]},"assertion":[{"value":"23 August 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}