{"id":"https://openalex.org/W2911939031","doi":"https://doi.org/10.5220/0005258501060113","title":"Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security","display_name":"Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2911939031","doi":"https://doi.org/10.5220/0005258501060113","mag":"2911939031"},"language":"en","primary_location":{"id":"doi:10.5220/0005258501060113","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005258501060113","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0005258501060113","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014313836","display_name":"Sriram Krishnamachari","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sriram Krishnamachari","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038458219","display_name":"Mehrdad Nojoumian","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mehrdad Nojoumian","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5078029373","display_name":"Kemal Akkaya","orcid":"https://orcid.org/0000-0002-7103-4545"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kemal Akkaya","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5014313836"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.4314,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.80189241,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"106","last_page":"113"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9362000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6565088033676147},{"id":"https://openalex.org/keywords/common-value-auction","display_name":"Common value auction","score":0.6432246565818787},{"id":"https://openalex.org/keywords/style","display_name":"Style (visual arts)","score":0.6356527805328369},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3351982533931732},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.1772020161151886},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.1373150646686554}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6565088033676147},{"id":"https://openalex.org/C163239763","wikidata":"https://www.wikidata.org/wiki/Q5153637","display_name":"Common value auction","level":2,"score":0.6432246565818787},{"id":"https://openalex.org/C2776445246","wikidata":"https://www.wikidata.org/wiki/Q1792644","display_name":"Style (visual arts)","level":2,"score":0.6356527805328369},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3351982533931732},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.1772020161151886},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.1373150646686554},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0005258501060113","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005258501060113","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0005258501060113","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005258501060113","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2263703840","https://openalex.org/W3125419042","https://openalex.org/W4388211099","https://openalex.org/W203077648","https://openalex.org/W995038129","https://openalex.org/W1569465204","https://openalex.org/W2100192999","https://openalex.org/W2561443874"],"abstract_inverted_index":{"Designing":[0],"a":[1,6,58],"sealed-bid":[2,62,73],"auction":[3,63,74],"protocol":[4],"is":[5],"challenging":[7],"problem":[8],"in":[9,25,34],"the":[10,26,37,45,95],"field":[11],"of":[12,18,36,47,61,76,94,100],"applied":[13],"cryptography.":[14],"In":[15],"the\r\n\r\nlast":[16],"couple":[17],"decades,":[19],"numerous":[20],"protocols":[21,78,84],"have":[22],"been":[23,51],"proposed":[24],"literature":[27],"where":[28],"each":[29],"one":[30],"has":[31,50],"its":[32],"own\r\n\r\nproperty":[33],"terms":[35],"security":[38],"model,":[39],"communication":[40],"and":[41,56,68,82,97],"computation":[42],"complexities.":[43],"To":[44],"best":[46],"our\r\n\r\nknowledge,":[48],"there":[49],"no":[52],"study":[53],"to":[54],"implement":[55],"compare":[57],"similar":[59],"class":[60],"protocols.\r\n\r\nThis":[64],"paper":[65],"therefore":[66],"implements":[67],"evaluates":[69],"five":[70],"different":[71],"Dutch-style":[72],"protocols,":[75],"which\r\n\r\nthree":[77],"are":[79,85],"computationally":[80],"secure":[81],"two":[83],"unconditionally":[86],"secure.":[87],"It":[88],"mainly":[89],"focuses":[90],"on\r\n\r\nthe":[91],"computational":[92],"cost":[93],"initialization":[96],"verification":[98],"phases":[99],"these":[101],"privacy-preserving":[102],"protocols.":[103]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2019-02-21T00:00:00"}
