{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:30:28Z","timestamp":1761323428751},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2006,3,31]],"date-time":"2006-03-31T00:00:00Z","timestamp":1143763200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2006,10]]},"DOI":"10.1007\/s10207-006-0001-y","type":"journal-article","created":{"date-parts":[[2006,4,25]],"date-time":"2006-04-25T02:17:57Z","timestamp":1145931477000},"page":"201-216","source":"Crossref","is-referenced-by-count":57,"title":["How to obtain full privacy in auctions"],"prefix":"10.1007","volume":"5","author":[{"given":"Felix","family":"Brandt","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,3,31]]},"reference":[{"key":"1_CR1","first-page":"115","volume-title":"Proceedings of the 5th International Conference on Public Key Cryptography (PKC). Lecture Notes in Computer Science (LNCS), vol. 2274","author":"M. Abe","year":"2002","unstructured":"Abe, M., Suzuki, K.: M+1-st price auction using homomorphic encryption. In: Proceedings of the 5th International Conference on Public Key Cryptography (PKC). Lecture Notes in Computer Science (LNCS), vol. 2274, pp. 115\u2013224. Springer, Berlin Heidelberg New York (2002)"},{"key":"1_CR2","first-page":"300","volume-title":"Proceedings of the 5th Annual Conference on Financial Cryptography (FC). Lecture Notes in Computer Science (LNCS), vol. 2339","author":"O. Baudron","year":"2001","unstructured":"Baudron, O., Stern, J.: Non-interactive private auctions. In: Proceedings of the 5th Annual Conference on Financial Cryptography (FC). Lecture Notes in Computer Science (LNCS), vol. 2339, pp. 300\u2013313. Springer, Berlin Heidelberg New York (2001)"},{"key":"1_CR3","first-page":"1","volume-title":"Proceedings of the 20th Annual ACM Symposium on the Theory of Computing (STOC)","author":"M. Ben-Or","year":"1988","unstructured":"Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of the 20th Annual ACM Symposium on the Theory of Computing (STOC), pp. 1\u201310. ACM, New York (1988)"},{"key":"1_CR4","unstructured":"Brandt, F.: Secure and private auctions without auctioneers. Tech. Rep. FKI-245-02, Department for Computer Science, Technical University of Munich, Munich (2002). ISSN 0941-6358"},{"key":"1_CR5","unstructured":"Brandt, F.: A verifiable, bidder-resolved auction protocol. In: Falcone, R., Barber, S., Korba, L., Singh, M. (eds.) Proceedings of the 5th AAMAS Workshop on Deception, Fraud and Trust in Agent Societies (Special Track on Privacy and Protection with Multi-Agent Systems), pp. 18\u201325 (2002)"},{"key":"1_CR6","first-page":"223","volume-title":"Proceedings of the 7th Annual Conference on Financial Cryptography (FC). Lecture Notes in Computer Science (LNCS), vol. 2742","author":"F. Brandt","year":"2003","unstructured":"Brandt, F.: Fully private auctions in a constant number of rounds. In: Wright, R.N. (ed.) Proceedings of the 7th Annual Conference on Financial Cryptography (FC). Lecture Notes in Computer Science (LNCS), vol. 2742, pp. 223\u2013238. Springer-Verlag, Berlin Heidelberg New York (2003)"},{"key":"1_CR7","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1145\/779928.779968","volume-title":"Proceedings of the 4th ACM Conference on Electronic Commerce","author":"F. Brandt","year":"2003","unstructured":"Brandt, F.: Social choice and preference protection\u2014Towards fully private mechanism design. In: Nisan, N. (ed.) Proceedings of the 4th ACM Conference on Electronic Commerce, pp. 220\u2013221. ACM, New York (2003)"},{"key":"1_CR8","first-page":"810","volume-title":"Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS)","author":"F. Brandt","year":"2004","unstructured":"Brandt, F., Sandholm, T.: (Impossibility of unconditionally privacy-preserving auctions. In: Sierra, C., Sonenberg, L. (eds.) Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS), pp. 810\u2013817. ACM, New York (2004)"},{"key":"1_CR9","unstructured":"Brandt, F., Sandholm, T.: On correctness and privacy in distributed mechanisms. In: Faratin, P., Rodriguez-Aguilar, J.A. (eds.) Selected and revised papers from the 6th AAMAS Workshop on Agent-Mediated Electronic Commerce (AMEC). Lecture Notes in Artificial Intelligence (LNAI), vol. 3435 (2004)"},{"key":"1_CR10","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1007\/11507840_26","volume-title":"Proceedings of the 9th International Conference on Financial Cryptography and Data Security (FC)","author":"F. Brandt","year":"2005","unstructured":"Brandt, F., Sandholm, T.: Efficient privacy-preserving protocols for multi-unit auctions. In: Patrick, A., Yung, M. (eds.) Proceedings of the 9th International Conference on Financial Cryptography and Data Security (FC). Lecture Notes in Computer Science (LNCS), vol. 3570, pp. 298\u2013312. Springer, Berlin Heidelberg New York (2005)"},{"key":"1_CR11","first-page":"11","volume-title":"Multi-party unconditionally secure protocols","author":"D. Chaum","year":"1988","unstructured":"Chaum, D., Cr\u00e9peau, C., Damg\u00e5rd, I.: Multi-party unconditionally secure protocols. In: Proceedings of the 20th Annual ACM Symposium on the Theory of Computing (STOC), pp. 11\u201319. ACM, New York (1988)"},{"key":"1_CR12","first-page":"3.1","volume-title":"Wallet databases with observers","author":"D. Chaum","year":"1992","unstructured":"Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Advances in Cryptology\u2014Proceedings of the 12th Annual International Cryptology Conference (CRYPTO). Lecture Notes in Computer Science (LNCS), vol. 740, pp. 3.1\u20133.6. Springer, Berlin Heidelberg New York (1992)"},{"key":"1_CR13","unstructured":"Chen, W.: Kryptographische Auktionsprotokolle Implementie\u2014rung und Analyse (2002). Systementwicklungsprojekt, Department for Computer Science, Technical University of Munich. http:\/\/www.chenwilly.info"},{"key":"1_CR14","first-page":"174","volume-title":"Advances in Cryptology\u2014Proceedings of the 14th Annual International Cryptology Conference (CRYPTO). Lecture Notes in Computer Science (LNCS), vol. 893","author":"R. Cramer","year":"1994","unstructured":"Cramer, R., Damg\u00e5rd, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: Advances in Cryptology\u2014Proceedings of the 14th Annual International Cryptology Conference (CRYPTO). Lecture Notes in Computer Science (LNCS), vol. 893, pp. 174\u2013187. Springer, Berlin Heidelberg New York (1994)"},{"key":"1_CR15","first-page":"103","volume-title":"Advances in Cryptology\u2014Proceedings of the 14th Eurocrypt Conference. Lecture Notes in Computer Science (LNCS), vol. 1233","author":"R. Cramer","year":"1997","unstructured":"Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. In: Advances in Cryptology\u2014Proceedings of the 14th Eurocrypt Conference. Lecture Notes in Computer Science (LNCS), vol. 1233, pp. 103\u2013118. Springer, Berlin Heidelberg New York (1997)"},{"key":"1_CR16","unstructured":"Damg\u00e5rd, I.: On \u03a3-protocols. Lecture Notes, University of Aarhus, Department for Computer Science (2002)"},{"key":"1_CR17","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. El Gamal","year":"1985","unstructured":"El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1_CR18","first-page":"186","volume-title":"Advances in Cryptology\u2014Proceedings of the 12th Annual International Cryptology Conference (CRYPTO)","author":"A. Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Advances in Cryptology\u2014Proceedings of the 12th Annual International Cryptology Conference (CRYPTO). Lecture Notes in Computer Science (LNCS), pp. 186\u2013194. Springer, Berlin Heidelberg New York (1987)"},{"issue":"5","key":"1_CR19","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1109\/32.502223","volume":"22","author":"M.K. Franklin","year":"1996","unstructured":"Franklin, M.K., Reiter, M.K.: The design and implementation of a secure auction service. IEEE Trans. Softw. Eng. 22(5), 302\u2013312 (1996)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"1_CR20","unstructured":"Garay, J., MacKenzie, P., Yang, K.: Efficient and secure multi-party computation with faulty majority and complete fairness. Cryptology ePrint Archive, Report 2004\/009 (2004)"},{"key":"1_CR21","first-page":"373","volume-title":"Proceedings of the Cryptographers' Track at the 12th RSA Conference","author":"R. Gennaro","year":"2003","unstructured":"Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Applications of Pedersen's distributed key generation protocol. In: Proceedings of the Cryptographers' Track at the 12th RSA Conference. Lecture Notes in Computer Science (LNCS), vol. 2612, pp. 373\u2013390. Springer, Berlin Heidelberg New York (2003)"},{"key":"1_CR22","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511721656","volume-title":"Foundations of Cryptography, vol. 2","author":"O. Goldreich","year":"2004","unstructured":"Goldreich, O.: Foundations of Cryptography, vol. 2. Basic Applications. Cambridge University Press, Cambridge (2004)"},{"key":"1_CR23","first-page":"218","volume-title":"Proceedings of the 19th Annual ACM Symposium on the Theory of Computing (STOC)","author":"O. Goldreich","year":"1987","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: Proceedings of the 19th Annual ACM Symposium on the Theory of Computing (STOC), pp. 218\u2013229. ACM, New York (1987)"},{"key":"1_CR24","first-page":"77","volume-title":"Advances in Cryptology\u2014Proceedings of the 10th Annual International Cryptology Conference (CRYPTO)","author":"S. Goldwasser","year":"1990","unstructured":"Goldwasser, S., Levin, L.: Fair computation of general functions in presence of immoral majority. In: Advances in Cryptology\u2014Proceedings of the 10th Annual International Cryptology Conference (CRYPTO). Lecture Notes in Computer Science (LNCS), vol. 537, pp. 77\u201393. Springer, Berlin Heidelberg New York (1990)"},{"key":"1_CR25","first-page":"17","volume-title":"Proceedings of the 16th International Symposium on Distributed Computing (DISC)","author":"S. Goldwasser","year":"2002","unstructured":"Goldwasser, S., Lindell, Y.: Secure computation without agreement. In: Proceedings of the 16th International Symposium on Distributed Computing (DISC). Lecture Notes in Computer Science (LNCS), vol. 2508, pp. 17\u201332. Springer, Berlin Heidelberg New York (2002)"},{"key":"1_CR26","first-page":"90","volume-title":"Proceedings of the 8th Annual Conference on Financial Cryptography (FC). Lecture Notes in Computer Science (LNCS), vol. 3110","author":"J. Groth","year":"2004","unstructured":"Groth, J.: Efficient maximal privacy in boardroom voting and anonymous broadcast. In: Proceedings of the 8th Annual Conference on Financial Cryptography (FC). Lecture Notes in Computer Science (LNCS), vol. 3110, pp. 90\u2013104. Springer, Berlin Heidelberg New York (2004)"},{"key":"1_CR27","unstructured":"Harkavy, M., Tygar, J.D., Kikuchi, H.: Electronic auctions with private bids. In: Proceedings of the 3rd USENIX Workshop on Electronic Commerce, pp. 61\u201374 (1998)"},{"key":"1_CR28","first-page":"162","volume-title":"Proceedings of the 6th Asiacrypt Conference. Lecture Notes in Computer Science (LNCS), vol. 1976","author":"M. Jakobsson","year":"2000","unstructured":"Jakobsson, M., Juels, A.: Mix and match: Secure function evaluation via ciphertexts. In: Proceedings of the 6th Asiacrypt Conference. Lecture Notes in Computer Science (LNCS), vol. 1976, pp. 162\u2013177. Springer, Berlin Heidelberg New York (2000)"},{"key":"1_CR29","first-page":"72","volume-title":"Proceedings of the 6th Annual Conference on Financial Cryptography (FC). Lecture Notes in Computer Science (LNCS), vol. 2357","author":"A. Juels","year":"2002","unstructured":"Juels, A., Szydlo, M.: A two-server, sealed-bid auction protocol. In: Blaze, M. (ed.) Proceedings of the 6th Annual Conference on Financial Cryptography (FC). Lecture Notes in Computer Science (LNCS), vol. 2357, pp. 72\u201386. Springer, Berlin Heidelberg New York (2002)"},{"key":"1_CR30","first-page":"141","volume-title":"Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptography (PKC), no. 2274. Lecture Notes in Computer Science (LNCS)","author":"A. Kiayias","year":"2002","unstructured":"Kiayias, A., Yung, M.: Self-tallying elections and perfect ballot secrecy. In: Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptography (PKC), no. 2274. Lecture Notes in Computer Science (LNCS), pp. 141\u2013158. Springer, Berlin Heidelberg New York (2002)"},{"key":"1_CR31","first-page":"303","volume-title":"Proceedings of the 7th Annual Conference on Financial Cryptography (FC). Lecture Notes in Computer Science (LNCS), vol. 2742","author":"A. Kiayias","year":"2003","unstructured":"Kiayias, A., Yung, M.: Non-interactive zero-sharing with applications to private distributed decision making. In: Proceedings of the 7th Annual Conference on Financial Cryptography (FC). Lecture Notes in Computer Science (LNCS), vol. 2742, pp. 303\u2013320. Springer, Berlin Heidelberg New York (2003)"},{"key":"1_CR32","first-page":"351","volume-title":"Proceedings of the 5th Annual Conference on Financial Cryptography (FC). Lecture Notes in Computer Science (LNCS), vol. 2339","author":"H. Kikuchi","year":"2001","unstructured":"Kikuchi, H.: (M+1)st-price auction protocol. In: Proceedings of the 5th Annual Conference on Financial Cryptography (FC). Lecture Notes in Computer Science (LNCS), vol. 2339, pp. 351\u2013363. Springer, Berlin Heidelberg New York (2001)"},{"issue":"3","key":"1_CR33","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1111\/1467-6419.00083","volume":"13","author":"P. Klemperer","year":"1999","unstructured":"Klemperer, P.: Auction theory: A guide to the literature. J. Econ. Surv. 13(3), 227\u2013286 (1999)","journal-title":"J. Econ. Surv."},{"key":"1_CR34","volume-title":"Auction Theory","author":"V. Krishna","year":"2002","unstructured":"Krishna, V.: Auction Theory. Academic, New York (2002)"},{"key":"1_CR35","first-page":"87","volume-title":"Proceedings of the 6th Annual Conference on Financial Cryptography (FC). Lecture Notes in Computer Science (LNCS), vol. 2357","author":"H. Lipmaa","year":"2002","unstructured":"Lipmaa, H., Asokan, N., Niemi, V.: Secure Vickrey auctions without threshold trust. In: Blaze, M. (ed.) Proceedings of the 6th Annual Conference on Financial Cryptography (FC). Lecture Notes in Computer Science (LNCS), vol. 2357, pp. 87\u2013101. Springer, Berlin Heidelberg New York (2002)"},{"key":"1_CR36","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1145\/336992.337028","volume-title":"Proceedings of the 1st ACM Conference on Electronic Commerce (ACM-EC)","author":"M. Naor","year":"1999","unstructured":"Naor, M., Pinkas, B., Sumner, R.: Privacy preserving auctions and mechanism design. In: Proceedings of the 1st ACM Conference on Electronic Commerce (ACM-EC), pp. 129\u2013139. ACM, New York (1999)"},{"key":"1_CR37","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/BF01384489","volume":"2","author":"H. Nurmi","year":"1993","unstructured":"Nurmi, H., Salomaa, A.: Cryptographic protocols for Vickrey auctions. Group Decis. Negot. 2, 363\u2013373 (1993)","journal-title":"Group Decis. Negot."},{"key":"1_CR38","first-page":"232","volume-title":"Proceedings of the 36th Annual ACM Symposium on the Theory of Computing (STOC)","author":"R. Pass","year":"2004","unstructured":"Pass, R.: Bounded-concurrent secure multiparty computation with a dishonest majority. In: Proceedings of the 36th Annual ACM Symposium on the Theory of Computing (STOC), pp. 232\u2013241. ACM, New York (2004)"},{"key":"1_CR39","first-page":"129","volume-title":"Advances in Cryptology\u2014Proceedings of the 11th Annual International Cryptology Conference (CRYPTO). Lecture Notes in Computer Science (LNCS), vol. 576","author":"T. Pedersen","year":"1991","unstructured":"Pedersen, T.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) Advances in Cryptology\u2014Proceedings of the 11th Annual International Cryptology Conference (CRYPTO). Lecture Notes in Computer Science (LNCS), vol. 576, pp. 129\u2013140. Springer, Berlin Heidelberg New York (1991)"},{"key":"1_CR40","first-page":"87","volume-title":"Proceedings of the 20th Eurocrypt Conference. Lecture Notes in Computer Science (LNCS), vol. 2656","author":"B. Pinkas","year":"2003","unstructured":"Pinkas, B.: Fair secure two-party computation. In: Proceedings of the 20th Eurocrypt Conference. Lecture Notes in Computer Science (LNCS), vol. 2656, pp. 87\u2013105. Springer, Berlin Heidelberg New York (2003)"},{"key":"1_CR41","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1145\/779928.779938","volume-title":"Proceedings of the 4th ACM Conference on Electronic Commerce (ACM-EC)","author":"R. Porter","year":"2003","unstructured":"Porter, R., Shoham, Y.: On cheating in sealed-bid auctions. In: Proceedings of the 4th ACM Conference on Electronic Commerce (ACM-EC), pp. 76\u201384. ACM, New York (2003)"},{"issue":"2","key":"1_CR42","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1086\/296663","volume":"68","author":"M.H. Rothkopf","year":"1995","unstructured":"Rothkopf, M.H., Harstad, R.M.: Two models of bid-taker cheating in Vickrey auctions. J. Business 68(2), 257\u2013267 (1995)","journal-title":"J. Business"},{"issue":"1","key":"1_CR43","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1086\/261670","volume":"98","author":"M.H. Rothkopf","year":"1990","unstructured":"Rothkopf, M.H., Teisberg, T.J., Kahn, E.P.: Why are Vickrey auctions rare? J. Pol. Econ. 98(1), 94\u2013109 (1990)","journal-title":"J. Pol. Econ."},{"key":"1_CR44","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1007\/978-3-540-46588-1_28","volume-title":"Proceedings of the 3rd International Conference on Public Key Cryptography (PKC)","author":"K. Sako","year":"2000","unstructured":"Sako, K.: An auction protocol which hides bids of losers. In: Proceedings of the 3rd International Conference on Public Key Cryptography (PKC). Lecture Notes in Computer Science (LNCS), vol. 1751, pp. 422\u2013432. Springer, Berlin Heidelberg New York (2000)"},{"issue":"3","key":"1_CR45","first-page":"107","volume":"4","author":"T. Sandholm","year":"2000","unstructured":"Sandholm, T.: Issues in computational Vickrey auctions. International Journal of Electronic Commerce, Special Issue Intell. Agents Electron. Commer. 4(3), 107\u2013129 (2000)","journal-title":"International Journal of Electronic Commerce Special Issue Intell. Agents Electron. Commer."},{"issue":"3","key":"1_CR46","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C.P. Schnorr","year":"1991","unstructured":"Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161\u2013174 (1991)","journal-title":"J. Cryptol."},{"key":"1_CR47","volume-title":"Proceedings of the 6th Annual Conference on Financial Cryptography (FC)","author":"K. Suzuki","year":"2002","unstructured":"Suzuki, K., Yokoo, M.: Secure combinatorial auctions by dynamic programming with polynomial secret sharing. In: Proceedings of the 6th Annual Conference on Financial Cryptography (FC). Lecture Notes in Computer Science (LNCS), vol. 2357. Springer, Berlin Heidelberg New York (2002)"},{"key":"1_CR48","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/978-3-540-45126-6_17","volume-title":"Proceedings of the 7th Annual Conference on Financial Cryptography (FC)","author":"K. Suzuki","year":"2003","unstructured":"Suzuki, K., Yokoo, M.: Secure generalized Vickrey auction using homomorphic encryption. In: Proceedings of the 7th Annual Conference on Financial Cryptography (FC). Lecture Notes in Computer Science (LNCS), vol. 2742, pp. 239\u2013249. Springer, Berlin Heidelberg New York (2003)"},{"key":"1_CR49","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/BFb0054019","volume-title":"Proceedings of the 1st International Workshop on Practice and Theory in Public Key Cryptography (PKC)","author":"Y. Tsiounis","year":"1998","unstructured":"Tsiounis, Y., Yung, M.: On the security of El Gamal-based encryption. In: Proceedings of the 1st International Workshop on Practice and Theory in Public Key Cryptography (PKC). Lecture Notes in Computer Science (LNCS), vol. 1431, pp. 117\u2013134. Springer, Berlin Heidelberg New York (1998)"},{"issue":"1","key":"1_CR50","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1111\/j.1540-6261.1961.tb02789.x","volume":"16","author":"W. Vickrey","year":"1961","unstructured":"Vickrey, W.: Counter speculation, auctions, and competitive sealed tenders. J. Finance 16(1), 8\u201337 (1961)","journal-title":"J. Finance"},{"key":"1_CR51","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: How to generate and exchange secrets. In: Proceedings of the 27th Symposium on Foundations of Computer Science (FOCS), pp. 162\u2013167. IEEE Comput. Soc. Press (1986)","DOI":"10.1109\/SFCS.1986.25"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-006-0001-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-006-0001-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-006-0001-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T11:01:22Z","timestamp":1559127682000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-006-0001-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,31]]},"references-count":51,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2006,10]]}},"alternative-id":["1"],"URL":"https:\/\/doi.org\/10.1007\/s10207-006-0001-y","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,3,31]]}}}