{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:44:05Z","timestamp":1742913845985,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031200953"},{"type":"electronic","value":"9783031200960"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-20096-0_11","type":"book-chapter","created":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T15:04:11Z","timestamp":1673535851000},"page":"133-146","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Lightweight NFT Auction Protocol for\u00a0Cross-chain Environment"],"prefix":"10.1007","author":[{"given":"Hongyu","family":"Guo","sequence":"first","affiliation":[]},{"given":"Mao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Ou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,13]]},"reference":[{"key":"11_CR1","unstructured":"Wang, Q., Li, R., Wang, Q., Chen, S.: Non-fungible token (NFT): overview. Evaluation, Opportunities and Challenges. arXiv (2021)"},{"key":"11_CR2","unstructured":"Entriken, W., Shirley, D., Evans, J., Sachs, N.: EIP-721: ERC-721 non-fungible token standard. Ethereum Improvement Proposals (721) (2018)"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-319-94340-4_12","volume-title":"Edge Computing \u2013 EDGE 2018","author":"L Deng","year":"2018","unstructured":"Deng, L., Chen, H., Zeng, J., Zhang, L.-J.: Research on cross-chain technology based on sidechain and hash-locking. In: Liu, S., Tekinerdogan, B., Aoyama, M., Zhang, L.-J. (eds.) EDGE 2018. LNCS, vol. 10973, pp. 144\u2013151. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-94340-4_12"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Smith, R.: An overview of the tesseract OCR engine. In: Ninth International Conference on Document Analysis and Recognition (ICDAR 2007), vol. 2, pp. 629\u2013633. IEEE (2007)","DOI":"10.1109\/ICDAR.2007.4376991"},{"issue":"4","key":"11_CR5","doi-asserted-by":"publisher","first-page":"975","DOI":"10.1016\/j.chb.2009.04.006","volume":"25","author":"CA Gumussoy","year":"2009","unstructured":"Gumussoy, C.A., Calisir, F.: Understanding factors affecting e-reverse auction use: an integrative approach. Comput. Hum. Behav. 25(4), 975\u2013988 (2009)","journal-title":"Comput. Hum. Behav."},{"issue":"3","key":"11_CR6","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MIS.2020.2977896","volume":"35","author":"L Liu","year":"2020","unstructured":"Liu, L., Du, M., Ma, X.: Blockchain-based fair and secure electronic double auction protocol. IEEE Intell. Syst. 35(3), 31\u201340 (2020)","journal-title":"IEEE Intell. Syst."},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Liu, W., Wu, H., Meng, T., Wang, R., Wang, Y., Xu, C.Z.: AucSwap: a Vickrey auction modeled decentralized cross-blockchain asset transfer protocol. J. Syst. Architect. 117, 102102 (2021)","DOI":"10.1016\/j.sysarc.2021.102102"},{"key":"11_CR8","first-page":"22","volume":"17","author":"LM Ausubel","year":"2006","unstructured":"Ausubel, L.M., Milgrom, P., et al.: The lovely but lonely Vickrey auction. Combin. Auctions 17, 22\u201326 (2006)","journal-title":"Combin. Auctions"},{"issue":"3","key":"11_CR9","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MIC.2020.3002423","volume":"24","author":"R Neisse","year":"2020","unstructured":"Neisse, R., et al.: An interledger blockchain platform for cross-border management of cybersecurity information. IEEE Internet Comput. 24(3), 19\u201329 (2020)","journal-title":"IEEE Internet Comput."},{"key":"11_CR10","unstructured":"Chaofan, Y., Wang, L., Zhou, A., Zhang, N., Tian, H., Xiao, J.: Method and apparatus for performing multi-party secure computing based-on issuing certificate. US Patent 11,038,699, 15 June 2021"},{"key":"11_CR11","unstructured":"Chow, J.: BTC relay. BTC-relay (2016)"},{"key":"11_CR12","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized Bus. Rev. 21260 (2008)"},{"issue":"2014","key":"11_CR13","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 151(2014), 1\u201332 (2014)","journal-title":"Ethereum Proj. Yellow Pap."},{"issue":"1","key":"11_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1086\/516585","volume":"172","author":"N Scoville","year":"2007","unstructured":"Scoville, N., et al.: The cosmic evolution survey (COSMOS): overview. Astrophys. J. Suppl. Ser. 172(1), 1 (2007)","journal-title":"Astrophys. J. Suppl. Ser."},{"key":"11_CR15","first-page":"2327","volume":"21","author":"G Wood","year":"2016","unstructured":"Wood, G.: Polkadot: vision for a heterogeneous multi-chain framework. White Pap. 21, 2327\u20134662 (2016)","journal-title":"White Pap."},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Herlihy, M.: Atomic cross-chain swaps. In: Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, pp. 245\u2013254 (2018)","DOI":"10.1145\/3212734.3212736"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Yang, G., Zang, C., Chen, J., Guo, D., Zhang, J.: Distributed fusion cross-chain model and architecture. IET Blockchain (2022)","DOI":"10.1049\/blc2.12013"},{"key":"11_CR18","unstructured":"S\u00e1nchez, D.C.: Raziel: private and verifiable smart contracts on blockchains. arXiv preprint arXiv:1807.09484 (2018)"},{"key":"11_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-662-58820-8_18","volume-title":"Financial Cryptography and Data Security","author":"HS Galal","year":"2019","unstructured":"Galal, H.S., Youssef, A.M.: Verifiable sealed-bid auction on the ethereum blockchain. In: Zohar, A., et al. (eds.) FC 2018. LNCS, vol. 10958, pp. 265\u2013278. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-662-58820-8_18"},{"issue":"1","key":"11_CR20","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/3387108","volume":"64","author":"Y Lindell","year":"2020","unstructured":"Lindell, Y.: Secure multiparty computation. Commun. ACM 64(1), 86\u201396 (2020)","journal-title":"Commun. ACM"},{"key":"11_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1007\/978-3-031-09234-3_36","volume-title":"Applied Cryptography and Network Security","author":"B David","year":"2022","unstructured":"David, B., Gentile, L., Pourpouneh, M.: FAST: fair auctions via secret transactions. In: Ateniese, G., Venturi, D. (eds.) ACNS 2022. LNCS, vol. 13269, pp. 727\u2013747. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-09234-3_36"},{"issue":"2","key":"11_CR22","first-page":"414","volume":"69","author":"RH Shi","year":"2021","unstructured":"Shi, R.H.: Anonymous quantum sealed-bid auction. IEEE Trans. Circ. Syst. II express briefs 69(2), 414\u2013418 (2021)","journal-title":"IEEE Trans. Circ. Syst. II express briefs"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20096-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T15:06:52Z","timestamp":1673536012000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20096-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031200953","9783031200960"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20096-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"13 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ml4cs2022\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}