{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:50:46Z","timestamp":1725490246859},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540663621"},{"type":"electronic","value":"9783540483908"}],"license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48390-x_17","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T11:10:11Z","timestamp":1188299411000},"page":"230-240","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["Fair On-Line Auctions without Special Trusted Parties"],"prefix":"10.1007","author":[{"given":"Stuart Gerhard","family":"Stubblebine","sequence":"first","affiliation":[]},{"given":"Paul F.","family":"Syverson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,8,30]]},"reference":[{"key":"17_CR1","unstructured":"Certmail: The Certified Electronic Mail System., \n                    http:\/\/www.certmail.com\n                    \n                  ."},{"issue":"2","key":"17_CR2","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"D. Chaum. \u201cUntraceable Electronic Mail, Return Addresses, and Digital Pseudonyms\u201d, Communications of the ACM, v. 24, n. 2, Feb. 1981, pages 84\u201388.","journal-title":"Communications of the ACM"},{"key":"17_CR3","unstructured":"L. Cottrell. \u201cMixmaster and Remailer Attacks\u201d, \n                    http:\/\/obscura.obscura.com\/~loki\/remailer\/remailer-essay.html\n                    \n                  . Note: Mixmaster remailers are based on the original mix design of Chaum [2]."},{"key":"17_CR4","unstructured":"S. Feldman. \u201cResearch Directions in Electronic Commerce\u201d, Keynote address to the 3rd\n                           USENIX Workshop on Electronic Commerce, Boston, Mass. September 1998."},{"issue":"5","key":"17_CR5","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/32.502223","volume":"22","author":"M.K. Franklin","year":"1996","unstructured":"M.K. Franklin and M.K. Reiter, \u201cThe Design and Implementation of a Secure Auction Service\u201d, IEEE Trans. on Software Eng., 22(5), May 1996, pp. 302\u2013312.","journal-title":"IEEE Trans. on Software Eng."},{"key":"17_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/BFb0055727","volume-title":"Advances in Cryptology-CRYPTO\u2019 98","author":"J. Kilian","year":"1998","unstructured":"J. Kilian and E. Petrank. \u201cIdentity Escrow\u201d, in Advances in Cryptology-CRYPTO\u2019 98, H. Krawczyk (ed.), Springer-Verlag, LNCS vol. 1462, pp. 169\u2013185, 1998."},{"key":"17_CR7","unstructured":"M. Kumar and S. Feldman. \u201cInternet Auctions\u201d, 3\n                           \n                    rd\n                  \n                            USENIX Workshop on Electronic Commerce, Boston, Mass. September 1998, pp. 49\u201360."},{"key":"17_CR8","unstructured":"M. Harkavy, J.D. Tygar and H. Kikuchi. \u201cElectronic Auctions with Private Bids\u201d, 3\n                           \n                    rd\n                  \n                           USENIX Workshop on Electronic Commerce, Boston, Mass. September 1998, pp. 61\u201373."},{"issue":"2","key":"17_CR9","first-page":"699","volume":"25","author":"R.P. McAfee","year":"1987","unstructured":"R.P. McAfee and J. McMillan, \u201cAuctions and Bidding\u201d, Journal of Economic Literature, Vol 25, No. 2, June 1987, pp. 699\u2013738.","journal-title":"Journal of Economic Literature"},{"key":"17_CR10","unstructured":"Netdox, Inc., \n                    http:\/\/www.netdox.com\n                    \n                  ."},{"issue":"4","key":"17_CR11","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1109\/49.668972","volume":"16","author":"M. Reed","year":"1998","unstructured":"M. Reed, P. Syverson, and D. Goldschlag. \u201cAnonymous Connections and Onion Routing\u201d, IEEE Journal on Selected Areas in Communications, vol. 16 no.4, May 1998, pp. 482\u2013494. (More information and further publications at \n                    http:\/\/www.onion-router.net\n                    \n                  )","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"17_CR12","unstructured":"R. Rivest, A. Shamir, and D. Wagner. Time-lock puzzles and timed-release Crypto. Unpublished manuscript, February, 1996."},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"P. Sanders, S. Rhodes, and A. Patel, \u201cAuctioning by Satellite using Trusted Third Party Security Services\u201d, 11\n                           \n                    th\n                  \n                           IFIP conference on Information Security, 1995, pp. 205\u2013219.","DOI":"10.1007\/978-0-387-34873-5_17"},{"key":"17_CR14","unstructured":"B. Schneier. Applied Cryptography, Second Edition: Protocols, Algorithms and Source Code in C, John Wiley and Sons, 1996."},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"S.G. Stubblebine, P.F. Syverson, and D.M. Goldschlag, \u201cUnlinkable Serial Transactions: Protocols and Applications\u201d, forthcoming in ACM Transactions on Information and System Security, November 1999. (A preliminary version of this paper appears in [18].)","DOI":"10.1145\/330382.330384"},{"key":"17_CR16","unstructured":"Surety Technologies, Inc., \n                    http:\/\/www.surety.com\n                    \n                  ."},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"P. Syverson. \u201cWeakly Secret Bit Commitment: Applications to Lotteries and Fair Exchange\u201d, 1998 IEEE Computer Security Foundations Workshop (CSFW11), Rockport Mass. June 1998, pp. 2\u201313.","DOI":"10.21236\/ADA464109"},{"key":"17_CR18","series-title":"Lect Notes Comput Sci","first-page":"39","volume-title":"Financial Cryptography: FC\u2019 97, Proceedings","author":"P.F. Syverson","year":"1998","unstructured":"P.F. Syverson, S.G. Stubblebine, and D.M. Goldschlag, \u201cUnlinkable Serial Transactions\u201d, in Financial Cryptography: FC\u2019 97, Proceedings, R. Hirschfeld (ed.), Springer-Verlag, LNCS vol. 1318, pp. 39\u201355, 1998."},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"E. Turban. Auctions and bidding on the internet: An assessment. International Journal of Electronic Markets, 7(4), 1997, \n                    http:\/\/www.electronicmarkets.org\n                    \n                  .","DOI":"10.1080\/10196789700000042"},{"key":"17_CR20","unstructured":"P. Wayner. Digital Timestamps: Punching an Electronic Clock, The New York Times on the Web: CyberTimes, Jan. 10, 1999, \n                    http:\/\/www.nytimes.com\/library\/tech\/99\/01\/cyber\/articles\/10notary.html\n                    \n                  ."},{"key":"17_CR21","unstructured":"http:\/\/swww.auctioninsider.com\/every.html\n                    \n                   (List of almost a hundred on-line auction houses.)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48390-X_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T10:39:35Z","timestamp":1558262375000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48390-X_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540663621","9783540483908"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/3-540-48390-x_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]},"assertion":[{"value":"30 August 1999","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}