{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T21:35:24Z","timestamp":1757453724976,"version":"3.37.3"},"reference-count":23,"publisher":"Wiley","issue":"16","license":[{"start":{"date-parts":[[2016,7,21]],"date-time":"2016-07-21T00:00:00Z","timestamp":1469059200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"},{"start":{"date-parts":[[2016,7,21]],"date-time":"2016-07-21T00:00:00Z","timestamp":1469059200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"name":"US National Science Foundation","award":["ECCS-1407986","AST-1443858","CNS-1265311","CNS-1162057"],"award-info":[{"award-number":["ECCS-1407986","AST-1443858","CNS-1265311","CNS-1162057"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61171014"],"award-info":[{"award-number":["61171014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm. Networks"],"published-print":{"date-parts":[[2016,11,10]]},"DOI":"10.1002\/sec.1522","type":"journal-article","created":{"date-parts":[[2016,7,22]],"date-time":"2016-07-22T04:32:04Z","timestamp":1469161924000},"page":"3833-3843","source":"Crossref","is-referenced-by-count":14,"title":["Secure multi-unit sealed first-price auction mechanisms"],"prefix":"10.1002","volume":"9","author":[{"given":"Wei","family":"Li","sequence":"first","affiliation":[{"name":"Department of Computer Science; The George Washington University; Washington DC USA"}]},{"given":"Maya","family":"Larson","sequence":"additional","affiliation":[{"name":"Department of Computer Science; The George Washington University; Washington DC USA"}]},{"given":"Chunqiang","family":"Hu","sequence":"additional","affiliation":[{"name":"Department of Computer Science; The George Washington University; Washington DC USA"}]},{"given":"Ruinian","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science; The George Washington University; Washington DC USA"}]},{"given":"Xiuzhen","family":"Cheng","sequence":"additional","affiliation":[{"name":"Department of Computer Science; The George Washington University; Washington DC USA"}]},{"given":"Rongfang","family":"Bie","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology; Beijing Normal University; Beijing China"}]}],"member":"311","published-online":{"date-parts":[[2016,7,21]]},"reference":[{"key":"10.1002\/sec.1522-BIB0001|sec1522-cit-0001","doi-asserted-by":"crossref","unstructured":"Li W Cheng X Bie R Zhao F An extensible and flexible truthful auction framework for heterogeneous spectrum markets Acm MobiHoc Philadelphia, USA 2014 175 184","DOI":"10.1145\/2632951.2632968"},{"issue":"1","key":"10.1002\/sec.1522-BIB0002|sec1522-cit-0002","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/2581555.2581557","article-title":"Truthful multi-attribute auction with discriminatory pricing in cognitive radio networks","volume":"18","author":"Li","year":"2014","journal-title":"ACM SIGMOBILE Mobile Computing and Communications Review"},{"key":"10.1002\/sec.1522-BIB0003|sec1522-cit-0003","doi-asserted-by":"crossref","unstructured":"Jing T Zhao C Xing X Huo Y Li W Cheng X A multi-unit truthful double auction framework for secondary market IEEE ICC Budapest, Hungary 2013","DOI":"10.1109\/ICC.2013.6654967"},{"key":"10.1002\/sec.1522-BIB0004|sec1522-cit-0004","doi-asserted-by":"crossref","unstructured":"Jing T Zhang F Ma L Li W Chen X Huo Y Tora: truthful online reverse auction with flexible preemption for access permission transaction in macro-femtocell networks WASA Zhangjiajie, China 2013 512 523","DOI":"10.1007\/978-3-642-39701-1_42"},{"key":"10.1002\/sec.1522-BIB0005|sec1522-cit-0005","doi-asserted-by":"crossref","unstructured":"Naor M Pinkas B Sumner R Privacy preserving auctions and mechanism design The 1st ACM Conference on Electronic Commerce Denver, CO, USA 1999 129 139","DOI":"10.1145\/336992.337028"},{"key":"10.1002\/sec.1522-BIB0006|sec1522-cit-0006","doi-asserted-by":"crossref","unstructured":"Huang Q Tao Y Wu F Spring: a strategy-proof and privacy preserving spectrum auction mechanism IEEE INFOCOM Turin, Italy 2013 851 859","DOI":"10.1109\/INFCOM.2013.6566870"},{"key":"10.1002\/sec.1522-BIB0007|sec1522-cit-0007","doi-asserted-by":"crossref","unstructured":"Chen Z Huang L Li L Yang W Miao H Tian M Wang F Ps-trust: provably secure solution for truthful double spectrum auctions IEEE INFOCOM Toronto, Canada 2014 1249 1257","DOI":"10.1109\/INFOCOM.2014.6848057"},{"issue":"4","key":"10.1002\/sec.1522-BIB0008|sec1522-cit-0008","doi-asserted-by":"crossref","first-page":"866","DOI":"10.1109\/JSAC.2011.110417","article-title":"Purging the back-room dealing: Secure spectrum auction leveraging paillier cryptosystem","volume":"29","author":"Pan","year":"2011","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"2","key":"10.1002\/sec.1522-BIB0009|sec1522-cit-0009","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/s11276-011-0390-3","article-title":"Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer","volume":"18","author":"Pan","year":"2012","journal-title":"Wireless Networks"},{"key":"10.1002\/sec.1522-BIB0010|sec1522-cit-0010","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/3-540-46088-8_27","article-title":"(m+1)st-price auction protocol","volume":"2339","author":"Kikuchi","year":"2002","journal-title":"Finacial Cryptography"},{"key":"10.1002\/sec.1522-BIB0011|sec1522-cit-0011","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/3-540-36504-4_4","article-title":"Secure combinatorial auctions by dynamic programming with polynomial secret sharing","volume":"2357","author":"Suzuki","year":"2003","journal-title":"Finacial Cryptography"},{"key":"10.1002\/sec.1522-BIB0012|sec1522-cit-0012","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1007\/978-3-319-06320-1_23","article-title":"Efficient sealed-bid auction protocols using verifiable secret sharing","volume":"8434","author":"Nojoumian","year":"2014","journal-title":"Information Security and Experience"},{"key":"10.1002\/sec.1522-BIB0013|sec1522-cit-0013","doi-asserted-by":"crossref","unstructured":"Larson M Hu C Li R Li W Cheng X Secure auctions without an auctioneer via verifiable secret sharing Workshop on Privacy-Aware Mobile Computing (PAMCO) 2015 in Conjunction with ACM MobiHoc 2015 ACM Hangzhou, China 2015","DOI":"10.1145\/2757302.2757305"},{"issue":"11","key":"10.1002\/sec.1522-BIB0014|sec1522-cit-0014","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Communications of the ACM"},{"key":"10.1002\/sec.1522-BIB0015|sec1522-cit-0015","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.tcs.2012.05.006","article-title":"Verifiable multi-secret sharing based on LFSR sequences","volume":"445","author":"Hu","year":"2012","journal-title":"Theoretical Computer Science"},{"key":"10.1002\/sec.1522-BIB0016|sec1522-cit-0016","doi-asserted-by":"crossref","unstructured":"Larson M Li R Hu C Li W Cheng X A bidder-oriented privacy-preserving vcg auction scheme The 10th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2015) Springer Qufu, China 2015","DOI":"10.1007\/978-3-319-21837-3_28"},{"issue":"9","key":"10.1002\/sec.1522-BIB0017|sec1522-cit-0017","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/JSAC.2013.SUP.0513004","article-title":"Body area network security: a fuzzy attribute-based signcryption scheme","volume":"31","author":"Hu","year":"2013","journal-title":"Selected Areas in Communications, IEEE Journal on"},{"key":"10.1002\/sec.1522-BIB0018|sec1522-cit-0018","doi-asserted-by":"crossref","unstructured":"Hu C Zhang F Cheng X Liao X Chen D Securing communications between external users and wireless body area networks Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy ACM Budapest, Hungary 2013 31 36","DOI":"10.1145\/2463183.2463191"},{"key":"10.1002\/sec.1522-BIB0019|sec1522-cit-0019","doi-asserted-by":"crossref","unstructured":"Hu C Zhang F Xiang T Li H Xiao X Huang G A practically optimized implementation of attribute based cryptosystems 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) IEEE Beijing, China 2014 197 204","DOI":"10.1109\/TrustCom.2014.29"},{"issue":"03","key":"10.1002\/sec.1522-BIB0020|sec1522-cit-0020","doi-asserted-by":"crossref","first-page":"(1","DOI":"10.1142\/S0219691312500233","article-title":"Secret image sharing based on chaotic map and chinese remainder theorem","volume":"10","author":"Hu","year":"2012","journal-title":"International Journal of Wavelets, Multiresolution and Information Processing"},{"volume-title":"New Economy Handbook","year":"2003","author":"Ausubel","key":"10.1002\/sec.1522-BIB0021|sec1522-cit-0021"},{"volume-title":"Auction Theory","year":"2010","author":"Krishna","key":"10.1002\/sec.1522-BIB0022|sec1522-cit-0022"},{"key":"10.1002\/sec.1522-BIB0023|sec1522-cit-0023","first-page":"223","article-title":"Public-key cryptosystems based on composite degree residuosity classes","volume":"LNCS 1592","author":"Paillier","year":"1999","journal-title":"EUROCRYPT"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1522","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1522","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/onlinelibrary.wiley.com\/wol1\/doi\/10.1002\/sec.1522\/fullpdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,4]],"date-time":"2021-07-04T05:14:43Z","timestamp":1625375683000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.1522"}},"subtitle":["Secure multi-unit sealed first-price auction mechanisms"],"short-title":[],"issued":{"date-parts":[[2016,7,21]]},"references-count":23,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2016,11,10]]}},"URL":"https:\/\/doi.org\/10.1002\/sec.1522","archive":["Portico"],"relation":{},"ISSN":["1939-0114"],"issn-type":[{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2016,7,21]]}}}