{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:54:34Z","timestamp":1740099274079,"version":"3.37.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030051709"},{"type":"electronic","value":"9783030051716"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05171-6_11","type":"book-chapter","created":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T10:52:06Z","timestamp":1544007126000},"page":"209-227","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Moderated Bargaining Game"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8030-7381","authenticated-orcid":false,"given":"Sumanta","family":"Chatterjee","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,5]]},"reference":[{"issue":"4","key":"11_CR1","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.2307\/1961664","volume":"83","author":"DP Baron","year":"1989","unstructured":"Baron, D.P., Ferejohn, J.A.: Bargaining in legislatures. Am. Polit. Sci. Rev. 83(4), 1181\u20131206 (1989). \nhttp:\/\/www.jstor.org\/stable\/1961664","journal-title":"Am. Polit. Sci. Rev."},{"key":"11_CR2","unstructured":"Bulow, J., Klempere, P.: Auctions vs. negotiations. Working Paper 4608, National Bureau of Economic Research, January 1996"},{"issue":"2","key":"11_CR3","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1017\/S0003055403000637","volume":"97","author":"GR Fr\u00e9chette","year":"2003","unstructured":"Fr\u00e9chette, G.R., Kagel, J.H., Lehrer, S.F.: Bargaining in legislatures: an experimental investigation of open versus closed amendment rules. Am. Polit. Sci. Rev. 97(2), 221\u2013232 (2003). \nhttps:\/\/doi.org\/10.1017\/S0003055403000637","journal-title":"Am. Polit. Sci. Rev."},{"issue":"7","key":"11_CR4","doi-asserted-by":"publisher","first-page":"1623","DOI":"10.2307\/1913954","volume":"45","author":"E Kalai","year":"1977","unstructured":"Kalai, E.: Proportional solutions to bargaining situations: interpersonal utility comparisons. Econometrica 45(7), 1623\u20131630 (1977). \nhttp:\/\/www.jstor.org\/stable\/1913954","journal-title":"Econometrica"},{"issue":"3","key":"11_CR5","doi-asserted-by":"publisher","first-page":"513","DOI":"10.2307\/1914280","volume":"43","author":"E Kalai","year":"1975","unstructured":"Kalai, E., Smorodinsky, M.: Other solutions to Nash\u2019s bargaining problem. Econometrica 43(3), 513\u2013518 (1975). \nhttp:\/\/www.jstor.org\/stable\/1914280","journal-title":"Econometrica"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/11935308_10","volume-title":"Information and Communications Security","author":"J Li","year":"2006","unstructured":"Li, J., Li, N.: A construction for general and efficient oblivious commitment based envelope protocols. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 122\u2013138. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/11935308_10"},{"issue":"4","key":"11_CR7","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1109\/TDSC.2006.54","volume":"3","author":"J Li","year":"2006","unstructured":"Li, J., Li, N.: OACerts: oblivious attribute certificates. IEEE Trans. Dependable Secure Comput. 3(4), 340\u2013352 (2006). \nhttps:\/\/doi.org\/10.1109\/TDSC.2006.54\n\n. \nhttp:\/\/ieeexplore.ieee.org\/document\/4012646\/","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"4","key":"11_CR8","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s00446-004-0116-1","volume":"17","author":"N Li","year":"2005","unstructured":"Li, N., Du, W., Boneh, D.: Oblivious signature-based envelope. Distrib. Comput. 17(4), 293\u2013302 (2005). \nhttps:\/\/doi.org\/10.1007\/s00446-004-0116-1","journal-title":"Distrib. Comput."},{"issue":"4","key":"11_CR9","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/5254.941356","volume":"16","author":"FR Lin","year":"2001","unstructured":"Lin, F.R., Chang, K.Y.: A multiagent framework for automated online bargaining. IEEE Intell. Syst. 16(4), 41\u201347 (2001). \nhttps:\/\/doi.org\/10.1109\/5254.941356","journal-title":"IEEE Intell. Syst."},{"key":"11_CR10","unstructured":"McKelvey, R.D.: An experimental test of a stochastic game model of committee bargaining. Laboratory Research in Political Economy, pp. 139\u2013168 (1991)"},{"issue":"3","key":"11_CR11","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s11127-011-9866-z","volume":"155","author":"L Miller","year":"2013","unstructured":"Miller, L., Vanberg, C.: Decision costs in legislative bargaining: an experimental analysis. Public Choice 155(3), 373\u2013394 (2013). \nhttps:\/\/doi.org\/10.1007\/s11127-011-9866-z","journal-title":"Public Choice"},{"issue":"1","key":"11_CR12","doi-asserted-by":"publisher","first-page":"128","DOI":"10.2307\/1906951","volume":"21","author":"J Nash","year":"1953","unstructured":"Nash, J.: Two-person cooperative games. Econometrica 21(1), 128\u2013140 (1953). \nhttp:\/\/www.jstor.org\/stable\/1906951","journal-title":"Econometrica"},{"issue":"2","key":"11_CR13","doi-asserted-by":"publisher","first-page":"155","DOI":"10.2307\/1907266","volume":"18","author":"JF Nash","year":"1950","unstructured":"Nash, J.F.: The bargaining problem. Econometrica 18(2), 155\u2013162 (1950). \nhttp:\/\/www.jstor.org\/stable\/1907266","journal-title":"Econometrica"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/11889663_19","volume-title":"Financial Cryptography and Data Security","author":"S Nasserian","year":"2006","unstructured":"Nasserian, S., Tsudik, G.: Revisiting oblivious signature-based envelopes. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 221\u2013235. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/11889663_19"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-48071-4_3","volume-title":"Advances in Cryptology \u2014 CRYPTO 1992","author":"T Okamoto","year":"1993","unstructured":"Okamoto, T.: Provably secure and practical identification schemes and corresponding signature schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 31\u201353. Springer, Heidelberg (1993). \nhttps:\/\/doi.org\/10.1007\/3-540-48071-4_3"},{"issue":"1","key":"11_CR16","doi-asserted-by":"publisher","first-page":"97","DOI":"10.2307\/1912531","volume":"50","author":"A Rubinstein","year":"1982","unstructured":"Rubinstein, A.: Perfect equilibrium in a bargaining model. Econometrica 50(1), 97\u2013109 (1982). \nhttp:\/\/www.jstor.org\/stable\/1912531","journal-title":"Econometrica"},{"issue":"4","key":"11_CR17","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1111\/1467-8640.t01-1-00209","volume":"18","author":"T Sandholm","year":"2002","unstructured":"Sandholm, T.: eMediator: a next generation electronic commerce server. Comput. Intell. 18(4), 656\u2013676 (2002)","journal-title":"Comput. Intell."},{"issue":"5626","key":"11_CR18","doi-asserted-by":"publisher","first-page":"1755","DOI":"10.1126\/science.1082976","volume":"300","author":"AG Sanfey","year":"2003","unstructured":"Sanfey, A.G., Rilling, J.K., Aronson, J.A., Nystrom, L.E., Cohen, J.D.: The neural basis of economic decision-making in the ultimatum game. Science 300(5626), 1755\u20131758 (2003). \nhttp:\/\/www.jstor.org\/stable\/3834595","journal-title":"Science"},{"issue":"1\/2","key":"11_CR19","first-page":"77","volume":"14","author":"JA Schellenberg","year":"1990","unstructured":"Schellenberg, J.A.: \u2018Solving\u2019 the bargaining problem. Mid-Am. Rev. Soc. 14(1\/2), 77\u201388 (1990). \nhttp:\/\/www.jstor.org\/stable\/23252907","journal-title":"Mid-Am. Rev. Soc."},{"key":"11_CR20","volume-title":"Theory of Games and Economic Behavior","author":"J Neumann Von","year":"1947","unstructured":"Von Neumann, J., Morgenstern, O.: Theory of Games and Economic Behavior. Princeton University Press, Princeton (1947). \nhttps:\/\/books.google.co.in\/books?id=AUDPAAAAMAAJ"},{"issue":"6","key":"11_CR21","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MIC.2002.1067734","volume":"6","author":"M Winslett","year":"2002","unstructured":"Winslett, M., et al.: Negotiating trust in the web. IEEE Internet Comput. 6(6), 30\u201337 (2002)","journal-title":"IEEE Internet Comput."},{"key":"11_CR22","volume-title":"Problems of monopoly and economic warfare","author":"F Zeuthen","year":"1967","unstructured":"Zeuthen, F.: Problems of monopoly and economic warfare. Routledge and K. Paul, London (1967). By F. Zeuthen; with a preface by Joseph A. Schumpeter"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05171-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T10:59:14Z","timestamp":1544007554000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05171-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030051709","9783030051716"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05171-6_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iciss.org.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"51","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}