{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:54:36Z","timestamp":1725771276198},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_3","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"32-44","source":"Crossref","is-referenced-by-count":0,"title":["A Security Framework for Multi-authority Based e-Sealed Bid Auction System"],"prefix":"10.1007","author":[{"given":"Sourav","family":"Sinha","sequence":"first","affiliation":[]},{"given":"Mamata","family":"Jenamani","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Boyd, C., Mao, W.: Security issues for electronic auctions. Hewlett-Packard Laboratories, HPL-2000-90 (2000)"},{"issue":"4","key":"3_CR2","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s10207-006-0001-y","volume":"5","author":"F. Brandt","year":"2006","unstructured":"Brandt, F.: How to obtain full privacy in auctions. International Journal of Information Security\u00a05(4), 201\u2013216 (2006)","journal-title":"International Journal of Information Security"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/978-3-540-70936-7_28","volume-title":"Theory of Cryptography","author":"M. Chase","year":"2007","unstructured":"Chase, M.: Multi-Authority Attribute Based Encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol.\u00a04392, pp. 515\u2013534. Springer, Heidelberg (2007)"},{"key":"3_CR4","unstructured":"Chase, M., Chow, S.M.: Anonymous key issuing for Authority Attribute Based Encryption, US Patent,12(355),862 (2007)"},{"key":"3_CR5","unstructured":"Girouard, J., M., Ratliff, E., J., Simon, K.D.:System and method for intrusion decision-making in autonomic computing environment, US Patent, US 2005 0278178 A1(2005)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Islam, M.S., Dey, S., Kundu, G., Hoque, A.S.M.: A solution to the security issue of an e-government procurement system. In: International Conference on Electrical and Computer Engineering, pp. 659\u2013664 (2008)","DOI":"10.1109\/ICECE.2008.4769292"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/3-540-36504-4_6","volume-title":"Financial Cryptography","author":"A. Juels","year":"2003","unstructured":"Juels, A., Szydlo, M.: A Two-Server, Sealed-Bid Auction Protocol. In: Blaze, M. (ed.) FC 2002. LNCS, vol.\u00a02357, pp. 72\u201386. Springer, Heidelberg (2003)"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Henecka, W., Schneider, T.: Two-Party Computation with Less Memory. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 437\u2013446 (2013)","DOI":"10.1145\/2484313.2484369"},{"issue":"5","key":"3_CR9","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1007\/s11390-008-9174-3","volume":"23","author":"M. Hinkelmann","year":"2011","unstructured":"Hinkelmann, M., Jakoby, A., Stechert, P.: t-Ptivate t-Secure auction. Journal of Computer Science and Technology\u00a023(5), 694\u2013710 (2011)","journal-title":"Journal of Computer Science and Technology"},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"2576","DOI":"10.1016\/j.ins.2011.02.005","volume":"181","author":"M. Li","year":"2011","unstructured":"Li, M., Juan, J., Tsai, J.S.T., Practical, J.H.C.: electronic auction scheme with strong anonymity. Information Science\u00a0181, 2576 (2011)","journal-title":"Information Science"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1016\/S0926-5805(02)00013-4","volume":"11","author":"T. Liao","year":"2002","unstructured":"Liao, T., Wang, S., Tserng, M.T., Framework, H.P.A.: of electronic tendering for government procurement: a lesson learned in Taiwan. Automation in Construction\u00a011, 731\u2013742 (2002)","journal-title":"Automation in Construction"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Lv, X., Li, H.S., Wang, B.: Group key agreement for secure group communication in dynamic peer systems. Journal of Parallel and Distributed Computing\u00a072(10) (2012)","DOI":"10.1016\/j.jpdc.2012.06.004"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Naor, M., Pinkas, B., Summer, R.: Privacy preserving auctions and mechanism design. In: ACM Conference on Electronic Commerce, vol.\u00a01, pp. 129\u2013139 (1999)","DOI":"10.1145\/336992.337028"},{"key":"3_CR14","doi-asserted-by":"publisher","first-page":"1939","DOI":"10.1016\/j.optcom.2009.01.026","volume":"282","author":"M. Naseri","year":"2009","unstructured":"Naseri, M.: Secure quantum sealed-bid auction. Optics Communications\u00a0282, 1939\u20131943 (2009)","journal-title":"Optics Communications"},{"key":"3_CR15","unstructured":"Olive, J.: Secure Document Management system, US patent, US 2008 0235175 A1 (2008)"},{"key":"3_CR16","unstructured":"Public Procurement Bill: Planning Commission, Government of India (2012)"},{"issue":"2","key":"3_CR17","doi-asserted-by":"publisher","first-page":"241","DOI":"10.3923\/itj.2012.241.247","volume":"11","author":"S. Pei","year":"2012","unstructured":"Pei, S., Chen, D., Chu, Y., Xu, Q., Xi, S.: Research of web service security model based on SOAP information. Information Technology Journal\u00a011(2), 241\u2013247 (2012)","journal-title":"Information Technology Journal"},{"key":"3_CR18","unstructured":"Richhariya, P., Singh, P.K.: A Survey on Financial Fraud Detection Methodologies. International Journal of Computer Applications, 45\u201322 (2012)"},{"key":"3_CR19","unstructured":"Seveda, R.: Document Security Management system, EP patent, EP 1 894866 B1 (2011)"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Shih, D.H., Yen, D.C., Cheng, C.H., Shih, M.H.: A secure multi-item e-auction mechanism with bid privacy. Computer & Security, 273\u2013287 (2011)","DOI":"10.1016\/j.cose.2011.02.004"},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/10718964_34","volume-title":"Information Security and Privacy","author":"K. Viswanathan","year":"2000","unstructured":"Viswanathan, K., Boyd, C., Dawson, E.: A Three Phased Schema for Sealed Bid Auction System Design. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol.\u00a01841, pp. 412\u2013426. Springer, Heidelberg (2000)"},{"key":"3_CR23","unstructured":"William, B.C., Elaine, B.: Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, NIST Special Publication, 800-67 (2012)"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Xiong, H., Chen, Z., Li, F.: Bidder-anonymous English auction protocol based on revocable ring signature. Expert Systems with Applications, 7062\u20137066 (2013)","DOI":"10.1016\/j.eswa.2012.01.040"},{"key":"3_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-642-38033-4_5","volume-title":"Information Security Practice and Experience","author":"H. Xiong","year":"2013","unstructured":"Xiong, H., Yuen, T.H., Zhang, C., He, Y.-J., Yiu, S.M.: Attribute specified identity-based encryption. In: Deng, R.H., Feng, T. (eds.) ISPEC 2013. LNCS, vol.\u00a07863, pp. 60\u201374. Springer, Heidelberg (2013)"},{"issue":"20","key":"3_CR26","doi-asserted-by":"publisher","first-page":"4167","DOI":"10.1016\/j.optcom.2009.07.010","volume":"282","author":"Y.G. Yang","year":"2009","unstructured":"Yang, Y.G., Naseri, M., Wen, Q.Y.: Improved secure quantum sealed-bid auction. Optics Communications\u00a0282(20), 4167\u20134170 (2009)","journal-title":"Optics Communications"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: FOCS 1982, pp. 160\u2013164. IEEE Computer Society (1982)","DOI":"10.1109\/SFCS.1982.38"},{"issue":"10","key":"3_CR28","doi-asserted-by":"publisher","first-page":"1675","DOI":"10.1093\/comjnl\/bxr080","volume":"54","author":"L. Zhou","year":"2011","unstructured":"Zhou, L., Varadharajan, V., Hitchens, M.: Enforcing Role-Based Access Control for Secure Data Storage in the Cloud. The Computer Journal\u00a054(10), 1675\u20131687 (2011)","journal-title":"The Computer Journal"},{"issue":"1","key":"3_CR29","first-page":"20","volume":"E81-A","author":"M. Kudo","year":"1998","unstructured":"Kudo, M.: Secure electronic sealed-bid auction protocol with public key cryptography. IEICE Trans. Fundamentals\u00a0E81-A(1), 20\u201327 (1998)","journal-title":"IEICE Trans. Fundamentals"},{"key":"3_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-10433-6_1","volume-title":"Cryptology and Network Security","author":"V. Kolesnikov","year":"2009","unstructured":"Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Improved garbled circuit building blocks and applications to auctions and computing minima. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol.\u00a05888, pp. 1\u201320. Springer, Heidelberg (2009)"},{"key":"3_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-540-46588-1_28","volume-title":"Public Key Cryptography","author":"K. Sako","year":"2000","unstructured":"Sako, K.: An auction protocol which hides bids of losers. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol.\u00a01751, pp. 422\u2013432. Springer, Heidelberg (2000)"},{"issue":"5","key":"3_CR32","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/32.502223","volume":"22","author":"K.M. Franklin","year":"1996","unstructured":"Franklin, K.M., Reiter, K.M.: The design and implementation of a secure auction service. IEEE Transaction on Software Engineering\u00a022(5), 302\u2013312 (1996)","journal-title":"IEEE Transaction on Software Engineering"},{"issue":"1","key":"3_CR33","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.dss.2008.12.009","volume":"14","author":"T.C. Du","year":"2009","unstructured":"Du, T.C.: Building an Automatic e-Tendering System on the Semantic Web. Decision Support Systems\u00a014(1), 13\u201321 (2009)","journal-title":"Decision Support Systems"},{"key":"3_CR34","unstructured":"Benatallah, B., Casati, F., Toumani, F.: Web Service Conversation Modeling: Cornerstone for e-Business Automation. IEEE Internet Computing 7(6) (2003)"},{"key":"3_CR35","unstructured":"Du, R., Foo, E., Boyd, C., Fitzgerald, B.: Defining security services for electronic tendering. In: The Australasian Information Security Workshop (AISW 2004), vol.\u00a032, pp. 43\u201352. Australian Computer Society Inc. and ACM (2004)"},{"issue":"16","key":"3_CR36","doi-asserted-by":"publisher","first-page":"3194","DOI":"10.1016\/j.optcom.2010.04.019","volume":"283","author":"Z. Zhao","year":"2010","unstructured":"Zhao, Z., Naseri, M., Zheng, Y.: Secure quantum sealed-bid auction with post confirmation. Opt. Commun.\u00a0283(16), 3194\u20133197 (2010)","journal-title":"Opt. Commun."},{"key":"3_CR37","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, pp. 175\u2013179 (December 1984)"},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"Beaver, D., Micali, S., Rogaway, P.: The round plexity of secure protocols. ACM Synopsis on Theory of Computing, 503\u2013513 (1990)","DOI":"10.1145\/100216.100287"},{"key":"3_CR39","doi-asserted-by":"crossref","unstructured":"Kabisch, S., Peintner, D., Heuer, J.: XML-based Web service generation for microcontroller-based sensor actor networks. In: 2010 8th IEEE International Workshop on Factory Communication Systems (WFCS), pp. 181\u2013184 (2010)","DOI":"10.1109\/WFCS.2010.5548607"},{"key":"3_CR40","first-page":"280","volume-title":"Multiparty computation from threshold homomorphic encryption","author":"R. Cramer","year":"2001","unstructured":"Cramer, R., Damg\u00e5rd, I., Nielsen, J.B.: Multiparty computation from threshold homomorphic encryption, pp. 280\u2013300. Springer, Heidelberg (2001)"},{"issue":"1","key":"3_CR41","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/S0925-5273(03)00103-8","volume":"90","author":"N.A. Panayiotou","year":"2004","unstructured":"Panayiotou, N.A., Sotiris, P.G., Ilias, P.T.: An e-procurement system for governmental purchasing. International Journal of Production Economics\u00a090(1), 79\u2013102 (2004)","journal-title":"International Journal of Production Economics"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T06:16:28Z","timestamp":1558851388000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}