{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:03Z","timestamp":1754157663701,"version":"3.41.2"},"reference-count":20,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2009,11,20]],"date-time":"2009-11-20T00:00:00Z","timestamp":1258675200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Info Mngmnt &amp; Comp Security"],"published-print":{"date-parts":[[2009,11,20]]},"DOI":"10.1108\/09685220911006696","type":"journal-article","created":{"date-parts":[[2009,11,28]],"date-time":"2009-11-28T07:04:29Z","timestamp":1259391869000},"page":"408-417","source":"Crossref","is-referenced-by-count":1,"title":["A new English auction scheme using the bulletin board system"],"prefix":"10.1108","volume":"17","author":[{"given":"Cheng\u2010Chi","family":"Lee","sequence":"first","affiliation":[]},{"given":"Min\u2010Shiang","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Chih\u2010Wei","family":"Lin","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"b5","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.02.007"},{"key":"b1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jeconom.2007.01.011"},{"key":"b6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"b7","doi-asserted-by":"publisher","DOI":"10.1109\/32.502223"},{"key":"b25","unstructured":"Hu, X., Qin, Z. and Li, F. (2009), \u201cAn anonymous sealed\u2010bid electronic auction based on ring signature\u201d,International Journal of Network Security, Vol. 3 No. 3, pp. 235\u201042."},{"key":"b8","unstructured":"Hwang, M.\u2010S. and Chang, T.\u2010Y. (2006), \u201cThreshold signatures: current status and key issues\u201d,International Journal of Network Security, Vol. 1 No. 3, pp. 123\u201037."},{"key":"b9","unstructured":"Hwang, M.\u2010S. and Lee, C.\u2010C. (2005), \u201cResearch issues and challenges for multiple digital signatures\u201d,International Journal of Network Security, Vol. 1 No. 1, pp. 1\u20107."},{"key":"b12","unstructured":"Kudo, M. (1998), \u201cSecure electronic sealed\u2010bid auction protocol with public key cryptography\u201d,IEICE Transactions on Fundamentals, Vol. E81\u2010A No. 1, pp. 20\u20107."},{"key":"b10","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-008-9094-3"},{"key":"b14","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cdt:19981599"},{"key":"b13","doi-asserted-by":"crossref","unstructured":"Lee, W.B., Kim, K. and Ma, J. (2001), \u201cEfficient public auction with one\u2010time registration and public verifiability\u201d,Proceedings of Indocrypt2001, Madras, pp. 16\u201020.","DOI":"10.1007\/3-540-45311-3_16"},{"key":"b15","unstructured":"Lu, E.J.\u2010L. and Huang, C.\u2010J. (2006), \u201cA time\u2010stamping proxy signature scheme using time\u2010stamping service\u201d,International Journal of Network Security, Vol. 2 No. 1, pp. 43\u201051."},{"key":"b16","doi-asserted-by":"crossref","unstructured":"Luo, G.L. and Chang, K.C. (2008), \u201cA new online auction with convertible authenticated encryption and authentication\u201d,IEEE International Conference on Intelligence and Security Informatics, pp. 288\u20109.","DOI":"10.1109\/ISI.2008.4565088"},{"key":"b17","doi-asserted-by":"publisher","DOI":"10.1007\/10718964_35"},{"key":"b18","doi-asserted-by":"crossref","unstructured":"Omote, K. and Miyaji, A. (2001), \u201cA practical English auction with one\u2010time registration\u201d,Proceedings of the Australasian Conference on Information Security and Privacy, ACISP2001, pp. 221\u201034.","DOI":"10.1007\/3-540-47719-5_19"},{"key":"b19","doi-asserted-by":"publisher","DOI":"10.1049\/el:19971065"},{"key":"b20","unstructured":"Petersen, H. (1997), \u201cHow to convert any digital signature scheme into a group signature scheme\u201d,Security Protocol Workshop, Paris, pp. 177\u201090."},{"key":"b22","unstructured":"Sramka, M. (2008), \u201cCryptanalysis of the cryptosystem based on DLP\u03b3=\u03b1a\u03b2b\u201d,International Journal of Network Security, Vol. 6 No. 1, pp. 80\u20101."},{"key":"b23","doi-asserted-by":"publisher","DOI":"10.1049\/el:19990071"},{"key":"b24","unstructured":"Wu, T.C., Chen, K.Y. and Lin, Z.Y. (2002), \u201cAn English auction mechanism for internet environment\u201d,Information Security Conference, pp. 331\u20107."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220911006696","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/09685220911006696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:11Z","timestamp":1753402151000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/17\/5\/408-417\/184965"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,20]]},"references-count":20,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2009,11,20]]}},"alternative-id":["10.1108\/09685220911006696"],"URL":"https:\/\/doi.org\/10.1108\/09685220911006696","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2009,11,20]]}}}