{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:40:55Z","timestamp":1762004455165,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,8,12]],"date-time":"2007-08-12T00:00:00Z","timestamp":1186876800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,8,12]]},"DOI":"10.1145\/1280940.1280967","type":"proceedings-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T15:35:23Z","timestamp":1349969723000},"page":"127-131","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["First price sealed bid auction without auctioneers"],"prefix":"10.1145","author":[{"given":"Shuo","family":"Zheng","sequence":"first","affiliation":[{"name":"University of Wollongong, Wollongong, Australia"}]},{"given":"Luke","family":"McAven","sequence":"additional","affiliation":[{"name":"University of Wollongong, Wollongong, Australia"}]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[{"name":"University of Wollongong, Wollongong, Australia"}]}],"member":"320","published-online":{"date-parts":[[2007,8,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. 5th International Conference on Public Key Cryptography (PKC 02)","author":"Abe M.","year":"2002","unstructured":"M. Abe and K. Suzuki . M + 1st price auction using homomorphic encryption . Proc. 5th International Conference on Public Key Cryptography (PKC 02) , 2002 . M. Abe and K. Suzuki. M + 1st price auction using homomorphic encryption. Proc. 5th International Conference on Public Key Cryptography (PKC 02), 2002."},{"key":"e_1_3_2_1_2_1","first-page":"300","volume-title":"Proc. 5th Annual Conference on Financial Cryptography","author":"Baudron O.","year":"2001","unstructured":"O. Baudron and J. Stern . Non-interactive private auctions . Proc. 5th Annual Conference on Financial Cryptography , pp. 300 -- 313 , 2001 . O. Baudron and J. Stern. Non-interactive private auctions. Proc. 5th Annual Conference on Financial Cryptography, pp. 300--313, 2001."},{"key":"e_1_3_2_1_3_1","first-page":"18","volume-title":"Auction Protocol. Proc. 5th International Workshop on Deception, Fraud and Trust in Agent Societies","author":"Brandt F.","year":"2002","unstructured":"F. Brandt . A verifiable, bidder-resolved Auction Protocol. Proc. 5th International Workshop on Deception, Fraud and Trust in Agent Societies , pp. 18 -- 25 , 2002 . F. Brandt. A verifiable, bidder-resolved Auction Protocol. Proc. 5th International Workshop on Deception, Fraud and Trust in Agent Societies, pp. 18--25, 2002."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319726"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.502223"},{"key":"e_1_3_2_1_6_1","first-page":"162","article-title":"Mix and match: Secure function evaluation via ciphertexts","volume":"00","author":"Jakobsson M.","year":"2000","unstructured":"M. Jakobsson and A. Juels . Mix and match: Secure function evaluation via ciphertexts . Proc. Asiacrypt 00 , pp. 162 -- 177 , 2000 . M. Jakobsson and A. Juels. Mix and match: Secure function evaluation via ciphertexts. Proc. Asiacrypt 00, pp. 162--177, 2000.","journal-title":"Proc. Asiacrypt"},{"key":"e_1_3_2_1_7_1","first-page":"02","article-title":"Szydlo A two server, sealed bid auction","author":"Juels A.","year":"2002","unstructured":"A. Juels and M . Szydlo A two server, sealed bid auction . Proc. Financial Cryptography 02 , 2002 . A. Juels and M. Szydlo A two server, sealed bid auction. Proc. Financial Cryptography 02, 2002.","journal-title":"Proc. Financial Cryptography"},{"key":"e_1_3_2_1_8_1","first-page":"62","volume-title":"Proc. 1st IEEE Workshop on Dependable and Real-Time E-Commerce Systems","author":"Kikuchi H.","year":"1998","unstructured":"H. Kikuchi , M. Harkavy and J. Tygar . Multi-round anonymous auction protocols . Proc. 1st IEEE Workshop on Dependable and Real-Time E-Commerce Systems , pp. 62 -- 69 , 1998 . H. Kikuchi, M. Harkavy and J. Tygar. Multi-round anonymous auction protocols. Proc. 1st IEEE Workshop on Dependable and Real-Time E-Commerce Systems, pp. 62--69, 1998."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765278.1765285"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337028"},{"key":"e_1_3_2_1_11_1","first-page":"162","volume-title":"Proc. 27th IEEE Symposium on Foundations of Computer Science","author":"Yao A.","year":"1986","unstructured":"A. Yao . Protocols for secure computations . Proc. 27th IEEE Symposium on Foundations of Computer Science , pp. 162 -- 167 , 1986 . A. Yao. Protocols for secure computations. Proc. 27th IEEE Symposium on Foundations of Computer Science, pp. 162--167, 1986."}],"event":{"name":"IWCMC07: International Wireless Communications and Mobile Computing Conference","sponsor":["SIGDOC ACM Special Interest Group on Systems Documentation","ACM Association for Computing Machinery","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGAPP ACM Special Interest Group on Applied Computing","SIGDOC ACM Special Interest Group for Design of Communications"],"location":"Honolulu Hawaii USA","acronym":"IWCMC07"},"container-title":["Proceedings of the 2007 international conference on Wireless communications and mobile computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1280940.1280967","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1280940.1280967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:41:23Z","timestamp":1750282883000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1280940.1280967"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,8,12]]},"references-count":11,"alternative-id":["10.1145\/1280940.1280967","10.1145\/1280940"],"URL":"https:\/\/doi.org\/10.1145\/1280940.1280967","relation":{},"subject":[],"published":{"date-parts":[[2007,8,12]]},"assertion":[{"value":"2007-08-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}