{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T16:51:38Z","timestamp":1759683098469},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030372279"},{"type":"electronic","value":"9783030372286"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-37228-6_1","type":"book-chapter","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T10:00:05Z","timestamp":1576490405000},"page":"3-22","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Trustless Framework for Iterative Double Auction Based on Blockchain"],"prefix":"10.1007","author":[{"given":"Truc D. T.","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"My T.","family":"Thai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,13]]},"reference":[{"key":"1_CR1","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"1_CR2","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 151, 1\u201332 (2014)","journal-title":"Ethereum Proj. Yellow Pap."},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Nguyen, L.N., Nguyen, T.D., Dinh, T.N., Thai, M.T.: OptChain: optimal transactions placement for scalable blockchain sharding. In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 525\u2013535. IEEE (2019)","DOI":"10.1109\/ICDCS.2019.00059"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Saad, M., Cook, V., Nguyen, L., Thai, M.T., Mohaisen, A.: Partitioning attacks on bitcoin: colliding space, time, and logic. In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE (2019)","DOI":"10.1109\/ICDCS.2019.00119"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: MedRec: using blockchain for medical data access and permission management. In: International Conference on Open and Big Data (OBD), pp. 25\u201330. IEEE (2016)","DOI":"10.1109\/OBD.2016.11"},{"issue":"9","key":"1_CR6","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MC.2018.3620971","volume":"51","author":"TN Dinh","year":"2018","unstructured":"Dinh, T.N., Thai, M.T.: AI and blockchain: a disruptive integration. Computer 51(9), 48\u201353 (2018)","journal-title":"Computer"},{"issue":"6","key":"1_CR7","doi-asserted-by":"publisher","first-page":"3154","DOI":"10.1109\/TII.2017.2709784","volume":"13","author":"J Kang","year":"2017","unstructured":"Kang, J., Yu, R., Huang, X., Maharjan, S., Zhang, Y., Hossain, E.: Enabling localized peer-to-peer electricity trading among plug-in hybrid electric vehicles using consortium blockchains. IEEE Trans. Ind. Inform. 13(6), 3154\u20133164 (2017)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"5","key":"1_CR8","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1109\/TDSC.2016.2616861","volume":"15","author":"NZ Aitzhan","year":"2016","unstructured":"Aitzhan, N.Z., Svetinovic, D.: Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Trans. Dependable Secure Comput. 15(5), 840\u2013852 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-030-04648-4_18","volume-title":"Computational Data and Social Networks","author":"TDT Nguyen","year":"2018","unstructured":"Nguyen, T.D.T., Pham, H.-A., Thai, M.T.: Leveraging blockchain to enhance data privacy in IoT-based applications. In: Chen, X., Sen, A., Li, W.W., Thai, M.T. (eds.) CSoNet 2018. LNCS, vol. 11280, pp. 211\u2013221. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-030-04648-4_18"},{"key":"1_CR10","first-page":"3","volume":"14","author":"D Friedman","year":"1993","unstructured":"Friedman, D.: The double auction market institution: a survey. Double Auction Market Inst. Theor. Evid. 14, 3\u201325 (1993)","journal-title":"Double Auction Market Inst. Theor. Evid."},{"key":"1_CR11","unstructured":"Parsons, S., Marcinkiewicz, M., Niu, J., Phelps, S.: Everything you wanted to know about double auctions, but were afraid to (bid or) ask (2006)"},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"3794","DOI":"10.1109\/ACCESS.2016.2591912","volume":"4","author":"MN Faqiry","year":"2016","unstructured":"Faqiry, M.N., Das, S.: Double-sided energy auction in microgrid: equilibrium under price anticipation. IEEE Access 4, 3794\u20133805 (2016)","journal-title":"IEEE Access"},{"key":"1_CR13","unstructured":"Iosifidis, G., Gao, L., Huang, J., Tassiulas, L.: An iterative double auction for mobile data offloading. In: 2013 11th International Symposium and Workshops on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), pp. 154\u2013161. IEEE (2013)"},{"issue":"1","key":"1_CR14","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/JSAC.2010.100110","volume":"28","author":"G Iosifidis","year":"2010","unstructured":"Iosifidis, G., Koutsopoulos, I.: Double auction mechanisms for resource allocation in autonomous networks. IEEE J. Sel. Areas Commun. 28(1), 95\u2013102 (2010)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Wang, J., Wang, Q., Zhou, N.: A decentralized electricity transaction mode of microgrid based on blockchain and continuous double auction. In: 2018 IEEE Power & Energy Society General Meeting (PESGM), pp. 1\u20135. IEEE (2018)","DOI":"10.1109\/PESGM.2018.8586322"},{"key":"1_CR16","doi-asserted-by":"publisher","unstructured":"Dziembowski, S., Faust, S., Host\u00e1kov\u00e1, K.: General state channel networks. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS 2018, pp. 949\u2013966. ACM, New York (2018). \nhttps:\/\/doi.org\/10.1145\/3243734.3243856","DOI":"10.1145\/3243734.3243856"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: Proceedings 2001 IEEE International Conference on Cluster Computing, pp. 136\u2013145. IEEE (2001)","DOI":"10.1109\/SFCS.2001.959888"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Thakur, S., Hayes, B.P., Breslin, J.G.: Distributed double auction for peer to peer energy trade using blockchains. In: 2018 5th International Symposium on Environment-Friendly Energies and Applications (EFEA), pp. 1\u20138. IEEE (2018)","DOI":"10.1109\/EFEA.2018.8617061"},{"key":"1_CR19","unstructured":"Ming, Z., et al.: Blockcloud: a blockchain-based service-centric network stack"},{"issue":"4","key":"1_CR20","doi-asserted-by":"publisher","first-page":"939","DOI":"10.1007\/s00779-013-0709-4","volume":"18","author":"Y-E Sun","year":"2014","unstructured":"Sun, Y.-E., et al.: SPRITE: a novel strategy-proof multi-unit double auction scheme for spectrum allocation in ubiquitous communications. Pers. Ubiquit. Comput. 18(4), 939\u2013950 (2014)","journal-title":"Pers. Ubiquit. Comput."},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Malavolta, G., Moreno-Sanchez, P., Kate, A., Maffei, M., Ravi, S.: Concurrency and privacy with payment-channel networks. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 455\u2013471. ACM (2017)","DOI":"10.1145\/3133956.3134096"},{"key":"1_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1007\/978-3-030-32101-7_30","volume-title":"Financial Cryptography and Data Security","author":"A Miller","year":"2019","unstructured":"Miller, A., Bentov, I., Bakshi, S., Kumaresan, R., McCorry, P.: Sprites and state channels: payment networks that go faster than lightning. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 508\u2013526. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-32101-7_30"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Zou, S., Ma, Z., Shao, Y., Ran, L., Liu, X.: Efficient and dynamic double auctions for resource allocation. In: 2016 IEEE 55th Conference on Decision and Control (CDC), pp. 6062\u20136067. IEEE (2016)","DOI":"10.1109\/CDC.2016.7799200"},{"issue":"1","key":"1_CR24","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36\u201363 (2001)","journal-title":"Int. J. Inf. Secur."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37228-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T10:02:14Z","timestamp":1576490534000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37228-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030372279","9783030372286"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37228-6_1","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"13 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, VA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}