{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:18:43Z","timestamp":1740147523939,"version":"3.37.3"},"reference-count":52,"publisher":"Informa UK Limited","issue":"4","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["ZR2017MF010, ZR2017MF062"],"award-info":[{"award-number":["ZR2017MF010, ZR2017MF062"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["61502218, 61771231","ZR2017MF062"],"award-info":[{"award-number":["61502218, 61771231","ZR2017MF062"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Enterprise Information Systems"],"published-print":{"date-parts":[[2021,4,21]]},"DOI":"10.1080\/17517575.2019.1597387","type":"journal-article","created":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T05:46:20Z","timestamp":1553838380000},"page":"492-512","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":16,"title":["Secure computation protocols under asymmetric scenarios in enterprise information system"],"prefix":"10.1080","volume":"15","author":[{"given":"Yilei","family":"Wang","sequence":"first","affiliation":[{"name":"School of Information Science and Engineering, Qufu Normal University, Qufu, China"},{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"given":"Minghao","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Software, Tsinghua University, Beijing, China"}]},{"given":"Yuemei","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Qufu Normal University, Qufu, China"}]},{"given":"Yijie","family":"Gao","sequence":"additional","affiliation":[{"name":"College of Automation & Electronic Engineering, Qingdao University of Science and Technology, Qingdao, China"}]},{"given":"Xinchun","family":"Cui","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Qufu Normal University, Qufu, China"}]}],"member":"301","published-online":{"date-parts":[[2019,3,28]]},"reference":[{"key":"cit0001","first-page":"53","volume-title":"Proceedings of the 25th Annual ACM Symposium on Principles of Distributed Computing","author":"Abraham I.","year":"2006"},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_31"},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_9"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_28"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_24"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9064-z"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4742-6"},{"key":"cit0009","first-page":"1","volume-title":"Multimedia Tools and Applications","author":"Bhushan K.","year":"2017"},{"issue":"1","key":"cit0010","first-page":"149","volume":"21","author":"Cai Y.","year":"2012","journal-title":"Chinese Journal of Electronics"},{"key":"cit0011","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/978-3-642-32928-9_16","volume-title":"International Conference on Security and Cryptography for Networks","author":"Canetti R.","year":"2012"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.4018\/IJESMA"},{"key":"cit0013","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2013.835071"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11799-2_25"},{"key":"cit0015","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1109\/FOCS.2013.75","volume-title":"Foundations of Computer Science (FOCS), 2013 IEEE 54th Annual Symposium On","author":"Garay J.","year":"2013"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656"},{"key":"cit0017","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1145\/1374376.1374436","volume-title":"Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing","author":"Gordon D. S.","year":"2008"},{"key":"cit0018","doi-asserted-by":"publisher","DOI":"10.1007\/11832072_16"},{"key":"cit0019","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9079-5"},{"issue":"1","key":"cit0020","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/2399187.2399189","volume":"1","author":"Gradwohl R.","year":"2013","journal-title":"ACM Transactions on Economics and Computation"},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_7"},{"key":"cit0022","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0105-3"},{"key":"cit0023","first-page":"623","volume-title":"STOC 2004: Proceedings of the 36th Annum ACM Symposium on Theory of Computing","author":"Halpern J.","year":"2004"},{"key":"cit0024","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/978-3-642-31448-3_3","volume-title":"Australasian Conference on Information Security and Privacy","author":"Higo H.","year":"2012"},{"key":"cit0025","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E93.A.42"},{"key":"cit0026","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78524-8_16"},{"key":"cit0027","first-page":"585","volume-title":"Foundations of Computer Science, 2005. FOCS 2005. 46th Annual IEEE Symposium On","author":"Izmalkov S.","year":"2005"},{"key":"cit0028","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2018.2793284"},{"key":"cit0029","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1080\/17517570802372468"},{"key":"cit0031","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1145\/1060590.1060671","volume-title":"Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing","author":"Lepinksi M.","year":"2005"},{"key":"cit0032","first-page":"1","volume-title":"Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing","author":"Lepinski M.","year":"2004"},{"issue":"4","key":"cit0033","first-page":"738","volume":"7","author":"Luo Z.","year":"2012","journal-title":"Journal of Networks"},{"key":"cit0034","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_11"},{"key":"cit0035","unstructured":"Maitra, A., and A. K. Pal. 2016. \u201cOn the Fairness of Groce\u2013Katz\u2019s Protocol for Rational Players.\u201d"},{"key":"cit0036","unstructured":"Maitra, A., G. Paul, and A. K. Pal. 2015. \u201cRevisiting Secure Two-Party Computation with Rational Players.\u201d Cryptology ePrint Archive, Report 2015\/1071. http:\/\/eprint.iacr.org\/2015\/1071."},{"key":"cit0037","first-page":"1","volume-title":"Parallel and Distributed Processing, 2008. IPDPS 2008. IEEE International Symposium On","author":"Maleka S.","year":"2008"},{"key":"cit0038","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79104-1_24"},{"key":"cit0039","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_4"},{"key":"cit0040","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_1"},{"key":"cit0041","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22540-6_40"},{"key":"cit0042","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_3"},{"volume-title":"A Course in Game Theory","year":"1994","author":"Osborne M. J.","key":"cit0043"},{"key":"cit0044","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-011-0775-2"},{"key":"cit0045","doi-asserted-by":"publisher","DOI":"10.1002\/sec.v8.2"},{"key":"cit0046","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-015-0299-2"},{"key":"cit0047","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2016.1253874"},{"issue":"4","key":"cit0048","first-page":"18","volume":"7","author":"Zhang E.","year":"2010","journal-title":"China Communications"},{"issue":"5","key":"cit0049","first-page":"1050","volume":"40","author":"Zhang E.","year":"2012","journal-title":"Acta Electronica Sinica"},{"key":"cit0050","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-011-4500-8"},{"key":"cit0051","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2017.1308559"},{"key":"cit0052","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC"}],"container-title":["Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/17517575.2019.1597387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,2]],"date-time":"2021-04-02T06:40:38Z","timestamp":1617345638000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/17517575.2019.1597387"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,28]]},"references-count":52,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,4,21]]}},"alternative-id":["10.1080\/17517575.2019.1597387"],"URL":"https:\/\/doi.org\/10.1080\/17517575.2019.1597387","relation":{},"ISSN":["1751-7575","1751-7583"],"issn-type":[{"type":"print","value":"1751-7575"},{"type":"electronic","value":"1751-7583"}],"subject":[],"published":{"date-parts":[[2019,3,28]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2018-10-15","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-03-17","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-03-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}