{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T12:35:22Z","timestamp":1726058122879},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811508172"},{"type":"electronic","value":"9789811508189"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-15-0818-9_20","type":"book-chapter","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T19:18:32Z","timestamp":1573154312000},"page":"308-326","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Fair and Verifiable Data Trading Scheme"],"prefix":"10.1007","author":[{"given":"Haiyong","family":"Yu","sequence":"first","affiliation":[]},{"given":"Juntao","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xuelian","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,8]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Juang, W.S., Shue, Y.Y.: A secure and privacy protection digital goods trading scheme in cloud computing. In: 2010 International Computer Symposium (ICS 2010), pp. 288\u2013293. IEEE (2010)","DOI":"10.1109\/COMPSYM.2010.5685500"},{"issue":"3","key":"20_CR2","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1049\/iet-ifs.2010.0228","volume":"6","author":"CL Chen","year":"2012","unstructured":"Chen, C.L., Liao, J.J.: Fair offline digital content transaction system. IET Inf. Secur. 6(3), 123\u2013130 (2012)","journal-title":"IET Inf. Secur."},{"issue":"2","key":"20_CR3","doi-asserted-by":"publisher","first-page":"464","DOI":"10.3390\/sym7020464","volume":"7","author":"RJ Hwang","year":"2015","unstructured":"Hwang, R.J., Lai, C.H.: Provable fair document exchange protocol with transaction privacy for e-commerce. Symmetry 7(2), 464\u2013487 (2015)","journal-title":"Symmetry"},{"key":"20_CR4","doi-asserted-by":"publisher","unstructured":"Delgado-Segura, S., et al.: A fair protocol for data trading based on Bitcoin transactions. Future Gener. Comput. Syst. (2017). \n                    https:\/\/doi.org\/10.1016\/j.future.2017.08.021","DOI":"10.1016\/j.future.2017.08.021"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Kiyomoto, S., Fukushima, K.: Fair-trading protocol for anonymised datasets requirements and solution. In: 2018 4th International Conference on Information Management (ICIM), pp. 13\u201316. IEEE (2018)","DOI":"10.1109\/INFOMAN.2018.8392661"},{"key":"20_CR6","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-981-13-3095-7_18","volume-title":"Frontiers in Cyber Security","author":"D Wang","year":"2018","unstructured":"Wang, D., Gao, J., Yu, H., Li, X.: A novel digital rights management in P2P networks based on Bitcoin system. In: Li, F., Takagi, T., Xu, C., Zhang, X. (eds.) FCS 2018. CCIS, vol. 879, pp. 227\u2013240. Springer, Singapore (2018). \n                    https:\/\/doi.org\/10.1007\/978-981-13-3095-7_18"},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/j.ins.2018.11.028","volume":"478","author":"Y Zhao","year":"2019","unstructured":"Zhao, Y., Yu, Y., Li, Y.: Machine learning based privacy-preserving fair data trading in big data marke. Inf. Sci. 478, 449\u2013460 (2019)","journal-title":"Inf. Sci."},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Missier, P., Bajoudah, S., Capossele, A., et al.: Mind My Value: a decentralized infrastructure for fair and trusted IoT data trading. In: Proceedings of the Seventh International Conference on the Internet of Things, p. 15. ACM (2017)","DOI":"10.1145\/3131542.3131564"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Alrawahi, A.S., Lee, K., Lotfi, A.: Trading of cloud of things resources. In: Proceedings of the Second International Conference on Internet of things and Cloud Computing, p. 163. ACM (2017)","DOI":"10.1145\/3018896.3056780"},{"key":"20_CR10","unstructured":"Perera, C.: Sensing as a service (S2aaS): Buying and selling IoT data. arXiv preprint \n                    arXiv:1702.02380\n                    \n                   (2017)"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Huang, Z., Su, X., Zhang, Y., et al.: A decentralized solution for IoT data trusted exchange based-on blockchain. In: 2017 3rd IEEE International Conference on Computer and Communications (ICCC), pp. 1180\u20131184. IEEE (2017)","DOI":"10.1109\/CompComm.2017.8322729"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Juang, W.S., Shue, Y.Y.: A secure and privacy protection digital goods trading scheme in cloud computing. In: 2010 International Computer Symposium (ICS 2010), pp. 288\u2013293. IEEE (2010)","DOI":"10.1109\/COMPSYM.2010.5685500"},{"issue":"3","key":"20_CR13","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1016\/j.jnca.2008.08.003","volume":"32","author":"SJ Lin","year":"2009","unstructured":"Lin, S.J., Liu, D.C.: An incentive-based electronic payment scheme for digital content transactions over the Internet. J. Netw. Comput. Appl. 32(3), 589\u2013598 (2009)","journal-title":"J. Netw. Comput. Appl."},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-540-77115-9_34","volume-title":"Distributed Computing and Internet Technology","author":"S-J Lin","year":"2007","unstructured":"Lin, S.-J., Liu, D.-C.: A fair-exchange and customer-anonymity electronic commerce protocol for digital content transactions. In: Janowski, T., Mohanty, H. (eds.) ICDCIT 2007. LNCS, vol. 4882, pp. 321\u2013326. Springer, Heidelberg (2007). \n                    https:\/\/doi.org\/10.1007\/978-3-540-77115-9_34"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Cattelan, R.G., He, S., Kirovski, D.: Prototyping a novel platform for free-trade of digital content. In: Proceedings of the 12th Brazilian Symposium on Multimedia and the Web, pp. 79\u201388. ACM (2006)","DOI":"10.1145\/1186595.1186606"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Fan, C.I., Juang, W.S., Chen, M.T.: Efficient fair content exchange in cloud computing. In: 2010 International Computer Symposium (ICS 2010), pp. 294\u2013299. IEEE (2010)","DOI":"10.1109\/COMPSYM.2010.5685498"},{"key":"20_CR17","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-642-14616-9_24","volume-title":"Advances in Intelligent Decision Technologies","author":"W Qian","year":"2010","unstructured":"Qian, W., Qi, S.: A fair transaction protocol with an offline semi-trusted third party. In: Phillips-Wren, G., Jain, L.C., Nakamatsu, K., Howlett, R.J. (eds.) Advances in Intelligent Decision Technologies, pp. 249\u2013257. Springer, Heidelberg (2010). \n                    https:\/\/doi.org\/10.1007\/978-3-642-14616-9_24"},{"key":"20_CR18","unstructured":"Rabin, M.O.: How to exchange secrets by oblivious transfer. Report no[R], TR-81, Harvard Aiken Computation Laboratory (1981)"},{"issue":"6","key":"20_CR19","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1145\/3812.3818","volume":"28","author":"S Even","year":"1985","unstructured":"Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637\u2013647 (1985)","journal-title":"Commun. ACM"},{"key":"20_CR20","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"20_CR21","volume-title":"Provable Security in Cryptography","author":"B Yang","year":"2017","unstructured":"Yang, B.: Provable Security in Cryptography. Tsinghua University Press, Beijing (2017). (In Chinese)"}],"container-title":["Communications in Computer and Information Science","Frontiers in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-0818-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T19:20:19Z","timestamp":1573154419000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-0818-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811508172","9789811508189"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-0818-9_20","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"8 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Frontiers in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fcs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fcs.xidian.edu.cn","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.55","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}