{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:08:51Z","timestamp":1746245331181,"version":"3.40.4"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2014,4,29]],"date-time":"2014-04-29T00:00:00Z","timestamp":1398729600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1007\/s00530-014-0372-2","type":"journal-article","created":{"date-parts":[[2014,4,28]],"date-time":"2014-04-28T06:01:16Z","timestamp":1398664876000},"page":"595-607","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secure peer-to-peer trading in small- and large-scale multiplayer games"],"prefix":"10.1007","volume":"20","author":[{"given":"Chris","family":"GauthierDickey","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Craig","family":"Ritzdorf","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,4,29]]},"reference":[{"key":"372_CR1","doi-asserted-by":"crossref","unstructured":"Asokan, N., Shoup, V., Waidner, M.: Asynchronous protocols for optimistic fair exchange. In: IEEE Symposium on Security and Privacy, pp. 86\u201399 (1998)","DOI":"10.1109\/SECPRI.1998.674826"},{"key":"372_CR2","unstructured":"Bao, F.: Efficient and practical fair exchange protocols with off-line ttp. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 77\u201385 (1998)"},{"issue":"1","key":"372_CR3","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/18.50372","volume":"36","author":"M Ben-Or","year":"1990","unstructured":"Ben-Or, M., Goldreich, O., Micali, S., Rivest, R.L.: A fair protocol for signing contracts. IEEE Transactions on Information Theory 36(1), 40\u201346 (1990)","journal-title":"IEEE Transactions on Information Theory"},{"key":"372_CR4","doi-asserted-by":"crossref","unstructured":"Bharambe, A.R., Agrawal, M., Seshan, S.: Mercury: Supporting scalable multi-attribute range queries. In: Proceedings of ACM SIGCOMM (2004)","DOI":"10.1145\/1015467.1015507"},{"key":"372_CR5","doi-asserted-by":"crossref","unstructured":"Buyukkaya, E., Abdallah, M., Cavagna, R.: Vorogame: A hybrid p2p architecture for massively multiplayer games. In: Proceedings of the 6th IEEE Consumer Communications and Networking Conference, pp. 1\u20135 (2009)","DOI":"10.1109\/CCNC.2009.4784788"},{"issue":"4","key":"372_CR6","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1145\/571637.571640","volume":"20","author":"M Castro","year":"2002","unstructured":"Castro, M., Liskov, B.: Practical byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems 20(4), 398\u2013461 (2002)","journal-title":"ACM Transactions on Computer Systems"},{"key":"372_CR7","series-title":"Lecture Notes in Computer Science","first-page":"200","volume-title":"Advances in Cryptography \u2013 EUROCRYPT\u201993","author":"IB D\u00e5mgard","year":"1993","unstructured":"D\u00e5mgard, I.B.: Practical and provably secure release of a secret and exchange of signatures. In: Helleseth, T. (ed.) Advances in Cryptography\u2014EUROCRYPT\u201993. Lecture Notes in Computer Science, vol. 765, pp. 200\u2013217. Springer, Berlin\/Heidelberg (1993)"},{"issue":"1","key":"372_CR8","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1023\/B:ELEC.0000045971.43390.c0","volume":"5","author":"M Fontoura","year":"2005","unstructured":"Fontoura, M., Ionescu, M., Minsky, N.: Decentralized peer-to-peer auctions. Electronic Commerce Research 5(1), 7\u201324 (2005). doi: 10.1023\/B:ELEC.0000045971.43390.c0","journal-title":"Electronic Commerce Research"},{"key":"372_CR9","doi-asserted-by":"crossref","unstructured":"Franklin, M.K., Reiter, M.K.: Fair exchange with a semi-trusted third party. In: Proceedings of the 4th ACM Conference on Computer and Communications, Security, pp. 1\u20135 (1997)","DOI":"10.1145\/266420.266424"},{"key":"372_CR10","doi-asserted-by":"crossref","unstructured":"GauthierDickey, C., Ritzdorf, C.: Secure peer-to-peer trading for multiplayer games. In: 11th International Workshop on Network and Systems Support for Games (NetGames\u201912), pp. 1\u20136 (2012)","DOI":"10.1109\/NetGames.2012.6404026"},{"key":"372_CR11","unstructured":"Knutsson, B., Lu, H., Xu, W., Hopkins, B.: Peer-to-peer support for massively multiplayer games. In: Proceedings of IEEE Infocom (2004)"},{"key":"372_CR12","unstructured":"Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. ACM Trans Program Lang Syst 4(3):382\u2013401, (1982) http:\/\/doi.acm.org\/10.1145\/357172.357176"},{"key":"372_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"P Maymounkov","year":"2002","unstructured":"Maymounkov, P., Mazi\u00e8res, D.: Kademlia: A peer-to-peer information system based on the xor metric. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) Peer-to-Peer Systems. Lecture Notes in Computer Science, vol. 2429, pp. 53\u201365. Springer, Berlin \/ Heidelberg (2002)"},{"key":"372_CR14","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. (2008) http:\/\/bitcoin.org\/bitcoin"},{"key":"372_CR15","doi-asserted-by":"crossref","unstructured":"Okamoto, T., Ohta, K.: How to simultaneously exchange secrets by general assumptions. In: Proceedings of the 2nd ACM Conference on Computer and Communications Security, ACM, pp. 184\u2013192 (1994)","DOI":"10.1145\/191177.191221"},{"key":"372_CR16","doi-asserted-by":"crossref","unstructured":"Pittman, D., GauthierDickey, C.: Match+guardian: A secure peer-to-peer trading card game protocol. Multimedia Systems pp. 1\u201312 (2012)","DOI":"10.1007\/s00530-012-0291-z"},{"key":"372_CR17","unstructured":"Ratnasamy, S., Francis, P., Handley, M., Karp, R., Schenker, S.: A scalable content-addressable network. In: Proceedings of ACM SIGCOMM, pp. 161\u2013172, (2001) http:\/\/doi.acm.org\/10.1145\/383059.383072"},{"key":"372_CR18","doi-asserted-by":"crossref","unstructured":"Rolli, D., Conrad, M., Neumann, D., Sorge, C.: An asynchronous and secure ascending peer-to-peer auction. In: Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems, ACM, pp. 105\u2013110 (2005)","DOI":"10.1145\/1080192.1080196"},{"key":"372_CR19","doi-asserted-by":"crossref","unstructured":"Rooney, S., Bauer, D., Deydier, R.: A federated peer-to-peer network game architecture. IEEE Communications 42(5) (2004)","DOI":"10.1109\/MCOM.2004.1299353"},{"key":"372_CR20","unstructured":"Rowstron, A.I.T., Druschel, P.: Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Proceedings of the IFIP\/ACM International Conference on Distributed Systems Platforms, Springer-Verlag, pp. 329\u2013350, (2001) http:\/\/research.microsoft.com\/~antr\/PAST\/pastry"},{"key":"372_CR21","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. In: Proceedings of ACM SIGCOMM, pp. 149\u2013160, (2001) http:\/\/doi.acm.org\/10.1145\/383059.383071"},{"key":"372_CR22","doi-asserted-by":"crossref","unstructured":"Syverson, P.: Weakly secret bit commitment: Applications to lotteries and fair exchange. In: 11th IEEE Proceedings of Computer Security Foundations, Workshop, pp. 2\u201313 (1998)","DOI":"10.21236\/ADA464109"},{"key":"372_CR23","doi-asserted-by":"crossref","unstructured":"Wierzbicki, A., Kucharski, T.: Fair and scalable peer-to-peer games of turns. In: Proceedings of the 11th International Conference on Parallel and Distributed Systems, vol. 1, pp. 250\u2013256 (2005)","DOI":"10.1109\/ICPADS.2005.154"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-014-0372-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00530-014-0372-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-014-0372-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T15:36:34Z","timestamp":1746200194000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00530-014-0372-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,29]]},"references-count":23,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["372"],"URL":"https:\/\/doi.org\/10.1007\/s00530-014-0372-2","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"type":"print","value":"0942-4962"},{"type":"electronic","value":"1432-1882"}],"subject":[],"published":{"date-parts":[[2014,4,29]]}}}