{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:11:03Z","timestamp":1725538263163},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642042799"},{"type":"electronic","value":"9783642042805"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04280-5_19","type":"book-chapter","created":{"date-parts":[[2009,9,18]],"date-time":"2009-09-18T05:25:31Z","timestamp":1253251531000},"page":"225-239","source":"Crossref","is-referenced-by-count":0,"title":["Anonymous, Yet Trustworthy Auctions"],"prefix":"10.1007","author":[{"given":"Prasit Bikash","family":"Chanda","sequence":"first","affiliation":[]},{"given":"Vincent","family":"Naessens","sequence":"additional","affiliation":[]},{"given":"Bart","family":"De Decker","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-73408-6_13","volume-title":"Public Key Infrastructure","author":"M. Layouni","year":"2007","unstructured":"Layouni, M., Vangheluwe, H.: Anonymous k-Show Credentials. In: L\u00f3pez, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol.\u00a04582, pp. 181\u2013192. Springer, Heidelberg (2007)"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Xiong, L., Liu, L.: A Reputation-Based Trust Model for Peer-to-Peer eCommerce Communities. In: IEEE International Conference on E-Commerce Technology (CEC 2003), p. 275 (2003)","DOI":"10.1145\/779950.779972"},{"key":"19_CR3","first-page":"40","volume-title":"Proceedings of the 1997 Workshop on Security Paradigms","author":"A.A. Rahman","year":"1998","unstructured":"Rahman, A.A., Hailes, S.: A Distributed Trust Model. In: Proceedings of the 1997 Workshop on Security Paradigms, pp. 40\u201368. ACM Press, New York (1998)"},{"key":"19_CR4","unstructured":"Kikuchi, H., Harkavy, M., Tygar, J.D.: Multi-round Anonymous Auction Protocol. Institute of Electronics, Information, and Communication Engineers Transactions on Information and Systems, 769\u2013777 (1999)"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1007\/10719724_30","volume-title":"Information Hiding","author":"F. Stajano","year":"2000","unstructured":"Stajano, F., Anderson, R.: The cocaine auction protocol: On the power of anonymous broadcast. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 434\u2013447. Springer, Heidelberg (2000)"},{"key":"19_CR6","unstructured":"Johnston, A.C., Warkentin, M.: The Online Consumer Trust Construct: A Web Merchant Practitioner Perspective. In: 7th Annual Conference of the Southern Association for Information Systems (2004)"},{"key":"19_CR7","first-page":"228","volume-title":"Using Context- and Content-Based Trust Policies on the Semantic Web","author":"C. Bizer","year":"2004","unstructured":"Bizer, C., Freie Universit\u00e4t: Using Context- and Content-Based Trust Policies on the Semantic Web, pp. 228\u2013229. ACM Press, New York (2004)"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1007\/3-540-45682-1_32","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"R.L. Rivest","year":"2001","unstructured":"Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 552\u2013567. Springer, Heidelberg (2001)"},{"key":"19_CR9","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/1128817.1128827","volume-title":"Proceedings of the 1st ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS 2006)","author":"M. Abdalla","year":"2006","unstructured":"Abdalla, M., M\u00f6ller, B.: Provably secure password-based authentication in TLS. In: Proceedings of the 1st ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS 2006), pp. 35\u201345. ACM Press, New York (2006)"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J. Camenisch","year":"2001","unstructured":"Camenisch, J., Lysyanskaya, A.: An efficient system for nontransferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 93\u2013118. Springer, Heidelberg (2001)"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM\u00a028(10), 1030\u20131044 (1983\/1985)","DOI":"10.1145\/4372.4373"},{"key":"19_CR12","unstructured":"Park, J.S., Ravi, S.: Smart Certificates: Extending X.509 for Secure Attribute Services on the Web. In: Proceedings of 22nd National Information Systems Security Conference (1999)"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-46766-1_9","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"T. Pedersen","year":"1992","unstructured":"Pedersen, T.: Non-Interactive and Information-Theoretical Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 129\u2013140. Springer, Heidelberg (1992)"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/3-540-44448-3_25","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"J. Camenisch","year":"2000","unstructured":"Camenisch, J., Damgard, I.: Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 331\u2013345. Springer, Heidelberg (2000)"},{"key":"19_CR15","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1070873.1070875","volume":"35","author":"S. Sch\u00fctz","year":"2005","unstructured":"Sch\u00fctz, S., Eggert, L., Schmid, S., Brunner, M.: Protocol enhancements for intermittently connected hosts. ACM Computer Communications Review\u00a035, 5\u201318 (2005)","journal-title":"ACM Computer Communications Review"},{"key":"19_CR16","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1109\/49.668972","volume":"16","author":"M.G. Reed","year":"1998","unstructured":"Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous Connections and Onion Routing. IEEE Journal on Selected Areas in Communications\u00a016, 482\u2013494 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"19_CR17","unstructured":"Hooks, M., Miles, J.: Onion Routing and Online Anonymity, Final paper for CS182S, Department of Computer Science, Duke University, Durham, NC, USA (2006)"},{"key":"19_CR18","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1613\/jair.1316","volume":"21","author":"M. Babaioff","year":"2004","unstructured":"Babaioff, M., Nisan, N.: Concurrent Auction across Supply Chain. Journal of Artificial Intelligence Research\u00a021, 595\u2013629 (2004)","journal-title":"Journal of Artificial Intelligence Research"},{"key":"19_CR19","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1145\/950191.950196","volume":"6","author":"M.R. Thompson","year":"2003","unstructured":"Thompson, M.R., Essiari, A.: Certificate-based Authorization Policy in a PKI Environment. ACM Transactions on Information and System Security\u00a06, 566\u2013588 (2003)","journal-title":"ACM Transactions on Information and System Security"},{"key":"19_CR20","unstructured":"Nelson, R., Aron, G.P.: \u201cp2p Trust Infrastructure\u201d, Computer Science Division, University of California"},{"key":"19_CR21","unstructured":"Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A., Rivest, R.L.: Handbook of Applied Cryptography (1997)"},{"key":"19_CR22","unstructured":"Brands, S.: A technical overview of digital credentials, White Paper (2002)"},{"key":"19_CR23","first-page":"1143","volume":"44","author":"T. Pedersen","year":"1996","unstructured":"Pedersen, T., Damgard, I., Pfitzmann, B.: Statistical secrecy and multi-bit commitments. IEEE Transactions on Information Theory\u00a044, 1143\u20131151 (1996)","journal-title":"IEEE Transactions on Information Theory"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Bogetoft, P., Christensen, D.L., Damgard, I., et al.: Secure Multiparty Computation Goes Live. In: FC 2009, Proc. Thirteenth International Conference on Financial Cryptography and Data Security, Cryptology ePrint Archive: Report 2008\/068 (2009)","DOI":"10.1007\/978-3-642-03549-4_20"}],"container-title":["IFIP Advances in Information and Communication Technology","Software Services for e-Business and e-Society"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04280-5_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T14:12:28Z","timestamp":1558534348000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04280-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642042799","9783642042805"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04280-5_19","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}