{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:06:08Z","timestamp":1730268368049,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/infocom.2015.7218591","type":"proceedings-article","created":{"date-parts":[[2015,8,24]],"date-time":"2015-08-24T17:33:36Z","timestamp":1440437616000},"page":"2065-2073","source":"Crossref","is-referenced-by-count":11,"title":["ITSEC: An information-theoretically secure framework for truthful spectrum auctions"],"prefix":"10.1109","author":[{"given":"Zhili","family":"Chen","sequence":"first","affiliation":[]},{"given":"Liusheng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Bureaucratic protocols for secure two-party sorting, selection, and permuting","author":"wang","year":"2010","journal-title":"Proc ASIACCS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409947"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062011"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656"},{"key":"ref14","article-title":"Efficient secure two-party protocols","author":"hazay","year":"2010","journal-title":"Techniques and constructions"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337028"},{"key":"ref16","article-title":"Secure generalized vickrey auction using homomorphic encryption","author":"suzuki","year":"2003","journal-title":"Proc FC"},{"key":"ref17","article-title":"Secure generalized vickrey auction without third-party servers","author":"yokoo","year":"2004","journal-title":"Proc FC"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36159-6_13"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1330332.1330338"},{"key":"ref28","first-page":"866","article-title":"Purging the Back-Room Dealing: Secure Spectrum Auction Leveraging Paillier Cryptosystem","volume":"29","author":"pan","year":"2011","journal-title":"IEEE JSAC"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847930"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848057"},{"article-title":"Secure Multiparty Computation and Secret Sharing: An Information Theoretic Approach. Book draft","year":"2014","author":"cramer","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566870"},{"key":"ref5","article-title":"Safeguarding cryptographic keys","author":"blakley","year":"1979","journal-title":"Proc NCC 48"},{"key":"ref8","article-title":"Sorting networks and their applications","volume":"32","author":"batcher","year":"1968","journal-title":"Proc AFIPS Spring Joint Computer Conference"},{"key":"ref7","article-title":"Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima","author":"kolesnikov","year":"2009","journal-title":"Proc CANS"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382279"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516751"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref20","article-title":"Trading sugar beet quotas: secure multiparty computation in practice","author":"damgard","year":"2008","journal-title":"ERCIM News"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935115"},{"year":"0","key":"ref21"},{"key":"ref24","article-title":"Truthful online spectrum allocation and auction in multi-channel wireless networks","author":"xu","year":"2011","journal-title":"Proc INFOCOM"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.241"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567002"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195762"}],"event":{"name":"IEEE INFOCOM 2015 - IEEE Conference on Computer Communications","start":{"date-parts":[[2015,4,26]]},"location":"Kowloon, Hong Kong","end":{"date-parts":[[2015,5,1]]}},"container-title":["2015 IEEE Conference on Computer Communications (INFOCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7172813\/7218353\/07218591.pdf?arnumber=7218591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T16:34:57Z","timestamp":1490373297000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7218591\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/infocom.2015.7218591","relation":{},"subject":[],"published":{"date-parts":[[2015,4]]}}}