{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:19:38Z","timestamp":1725578378482},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642197505"},{"type":"electronic","value":"9783642197512"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19751-2_15","type":"book-chapter","created":{"date-parts":[[2011,2,24]],"date-time":"2011-02-24T10:55:17Z","timestamp":1298544917000},"page":"223-238","source":"Crossref","is-referenced-by-count":11,"title":["Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus"],"prefix":"10.1007","author":[{"given":"Naipeng","family":"Dong","sequence":"first","affiliation":[]},{"given":"Hugo","family":"Jonker","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Pang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Harkavy, M., Tygar, J.D., Kikuchi, H.: Electronic auctions with private bids. In: Proc. 3rd USENIX Workshop on Electronic Commerce, pp. 61\u201374 (1998)"},{"key":"15_CR2","first-page":"120","volume-title":"Proc. CCS 1999","author":"C. Cachin","year":"1999","unstructured":"Cachin, C.: Efficient private bidding and auctions with an oblivious third party. In: Proc. CCS 1999, pp. 120\u2013127. ACM Press, New York (1999)"},{"key":"15_CR3","first-page":"129","volume-title":"Proc. ACM-EC 1999","author":"M. Naor","year":"1999","unstructured":"Naor, M., Pinkas, B., Sumner, R.: Privacy preserving auctions and mechanism design. In: Proc. ACM-EC 1999, pp. 129\u2013139. ACM Press, New York (1999)"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/3-540-45811-5_14","volume-title":"Information Security","author":"M. Abe","year":"2002","unstructured":"Abe, M., Suzuki, K.: Receipt-free sealed-bid auction. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol.\u00a02433, pp. 191\u2013199. Springer, Heidelberg (2002)"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/3-540-36504-4_7","volume-title":"Financial Cryptography","author":"H. Lipmaa","year":"2003","unstructured":"Lipmaa, H., Asokan, N., Niemi, V.: Secure vickrey auctions without threshold trust. In: Blaze, M. (ed.) FC 2002. LNCS, vol.\u00a02357, pp. 87\u2013101. Springer, Heidelberg (2003)"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-540-24691-6_20","volume-title":"Information Security and Cryptology - ICISC 2003","author":"X. Chen","year":"2004","unstructured":"Chen, X., Lee, B., Kim, K.: Receipt-free electronic auction schemes using homomorphic encryption. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol.\u00a02971, pp. 259\u2013273. Springer, Heidelberg (2004)"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.\u00a01055, pp. 147\u2013166. Springer, Heidelberg (1996)"},{"key":"15_CR8","first-page":"266","volume-title":"Proc. CSFW 2004","author":"R. Chadha","year":"2004","unstructured":"Chadha, R., Kremer, S., Scedrov, A.: Formal analysis of multi-party contract signing. In: Proc. CSFW 2004, pp. 266\u2013279. IEEE CS, Los Alamitos (2004)"},{"key":"15_CR9","first-page":"104","volume-title":"Proc. POPL 2001","author":"M. Abadi","year":"2001","unstructured":"Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proc. POPL 2001, pp. 104\u2013115. ACM, New York (2001)"},{"key":"15_CR10","first-page":"82","volume-title":"Proc. CSFW 2001","author":"B. Blanchet","year":"2001","unstructured":"Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proc. CSFW 2001, pp. 82\u201396. IEEE CS, Los Alamitos (2001)"},{"issue":"4","key":"15_CR11","doi-asserted-by":"publisher","first-page":"435","DOI":"10.3233\/JCS-2009-0340","volume":"17","author":"S. Delaune","year":"2009","unstructured":"Delaune, S., Kremer, S., Ryan, M.D.: Verifying privacy-type properties of electronic voting protocols. J. Computer Security\u00a017(4), 435\u2013487 (2009)","journal-title":"J. Computer Security"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/978-3-540-31987-0_14","volume-title":"Programming Languages and Systems","author":"S. Kremer","year":"2005","unstructured":"Kremer, S., Ryan, M.D.: Analysis of an electronic voting protocol in the applied pi calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol.\u00a03444, pp. 186\u2013200. Springer, Heidelberg (2005)"},{"issue":"2-3","key":"15_CR13","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.jalgor.2009.02.007","volume":"64","author":"H.L. Jonker","year":"2009","unstructured":"Jonker, H.L., Mauw, S., Pang, J.: A formal framework for quantifying voter-controlled privacy. J. Algorithms\u00a064(2-3), 89\u2013105 (2009)","journal-title":"J. Algorithms"},{"issue":"2","key":"15_CR14","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.C.: On the security of public key protocols. IEEE Trans. Information Theory\u00a029(2), 198\u2013207 (1983)","journal-title":"IEEE Trans. Information Theory"},{"issue":"1","key":"15_CR15","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.jlap.2007.06.002","volume":"75","author":"B. Blanchet","year":"2008","unstructured":"Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. J. Log. Algebr. Program.\u00a075(1), 3\u201351 (2008)","journal-title":"J. Log. Algebr. Program."},{"key":"15_CR16","first-page":"195","volume-title":"Proc. CSF 2008","author":"M. Backes","year":"2008","unstructured":"Backes, M., Hri\u0163cu, C., Maffei, M.: Automated verification of remote electronic voting protocols in the applied pi-calculus. In: Proc. CSF 2008, pp. 195\u2013209. IEEE CS, Los Alamitos (2008)"},{"key":"15_CR17","first-page":"251","volume-title":"Proc. S&P 2009","author":"R. K\u00fcsters","year":"2009","unstructured":"K\u00fcsters, R., Truderung, T.: An epistemic approach to coercion-resistance for electronic voting protocols. In: Proc. S&P 2009, pp. 251\u2013266. IEEE CS, Los Alamitos (2009)"},{"key":"15_CR18","first-page":"122","volume-title":"Proc. CSF 2010","author":"R. K\u00fcsters","year":"2010","unstructured":"K\u00fcsters, R., Truderung, T., Vogt, A.: A game-based definition of coercion-resistance and its applications. In: Proc. CSF 2010, pp. 122\u2013136. IEEE CS, Los Alamitos (2010)"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects of Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19751-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T08:34:41Z","timestamp":1558427681000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19751-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642197505","9783642197512"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19751-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}