{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T20:00:16Z","timestamp":1649188816399},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,8,12]],"date-time":"2016-08-12T00:00:00Z","timestamp":1470960000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100007225","name":"Ministry of Science and Technology","doi-asserted-by":"publisher","award":["MOST103-2632-E-324-001-MY3, MOST 103-2221-E-324 -023, MOST 103-2622-E-212-009 -CC2 and MOST 104-2221-E-324-012"],"id":[{"id":"10.13039\/100007225","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1007\/s00500-016-2313-9","type":"journal-article","created":{"date-parts":[[2016,8,12]],"date-time":"2016-08-12T09:10:57Z","timestamp":1470993057000},"page":"119-135","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A fair and secure group buying system based on arbitration computing mechanism"],"prefix":"10.1007","volume":"22","author":[{"given":"Chin-Ling","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yong-Yuan","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,12]]},"reference":[{"issue":"1","key":"2313_CR1","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"2007","unstructured":"Burrows M, Abadi M, Needham R (2007) A logic of authentication. ACM Trans Comput Syst 8(1):18\u201336","journal-title":"ACM Trans Comput Syst"},{"issue":"1","key":"2313_CR2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3\u201372","journal-title":"J Cryptol"},{"issue":"7","key":"2313_CR3","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B Bloom","year":"1970","unstructured":"Bloom B (1970) Space\/time tradeoffs in hash coding with allowable errors. Commun ACM 13(7):422\u2013426","journal-title":"Commun ACM"},{"issue":"3","key":"2313_CR4","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1016\/j.elerap.2010.09.001","volume":"10","author":"CL Chen","year":"2011","unstructured":"Chen CL, Liao JJ (2011) A fair online payment system for digital content via subliminal channel. Electron. CommerRes Appl 10(3):279\u2013287","journal-title":"Electron. CommerRes Appl"},{"issue":"4","key":"2313_CR5","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MITP.2012.49","volume":"14","author":"WY Chung","year":"2012","unstructured":"Chung WY, Chen L (2012) Group-buying e-commerce in China. IT Prof 14(4):24\u201330","journal-title":"IT Prof"},{"key":"2313_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of rijndael: AES\u2014the advanced encryption standard","author":"J Daemen","year":"2002","unstructured":"Daemen J, Rijmen V (2002) The design of rijndael: AES\u2014the advanced encryption standard. Springer, New York"},{"issue":"4","key":"2313_CR7","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal T (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4):469\u2013472","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2313_CR8","doi-asserted-by":"crossref","unstructured":"Feng ZN, Zhu YM, Zhang Q, Ni LM, Vasilakos AV (2014) TRAC: truthful auction for location-aware collaborative sensing in mobile crowdsourcing. In: IEEE INFOCOM 2014\u2014IEEE conference on computer communications, 1231\u20131239","DOI":"10.1109\/INFOCOM.2014.6848055"},{"key":"2313_CR9","unstructured":"Gilt City (2015) https:\/\/www.giltcity.com\/ . Accessible 18 Nov 18 2015"},{"key":"2313_CR10","unstructured":"GOMAJI (2015) http:\/\/www.gomaji.com\/ . Accessible 18 Nov18 2015"},{"key":"2313_CR11","unstructured":"Ihergo (2015) http:\/\/www.ihergo.com\/ . Accessible 18 Nov 2015"},{"key":"2313_CR12","unstructured":"ITU (2015) http:\/\/www.itu.int\/en\/pages\/default.aspx\/ . Accessible 18 Nov 2015"},{"issue":"8","key":"2313_CR13","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing Q, Vasilakos AV, Wan JF, Lu JW, Qiu DH (2014) Security of the Internet of things: perspectives and challenges. Wirel. Netw 20(8):2481\u20132501","journal-title":"Wirel. Netw"},{"key":"2313_CR14","unstructured":"Juhuasuan (2015) http:\/\/ju.taobao.com\/ . Accessible 18 Nov 18 2015"},{"key":"2313_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.elerap.2012.09.005","volume":"12","author":"JS Lee","year":"2013","unstructured":"Lee JS, Lin KS (2013) An innovative electronic group-buying system for mobile commerce. Electron Commerce Res Appl 12:1\u201313","journal-title":"Electron Commerce Res Appl"},{"key":"2313_CR16","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1016\/j.jnca.2013.02.034","volume":"36","author":"X Li","year":"2013","unstructured":"Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card remote user password authentication scheme. J Netw Comput Appl 36:1365\u20131371","journal-title":"J Netw Comput Appl"},{"issue":"3","key":"2313_CR17","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1109\/TIFS.2013.2296437","volume":"9","author":"BY Liu","year":"2014","unstructured":"Liu BY, Bi J, Vasilakos AV (2014) Toward incentivizing anti-spoofing deployment. IEEE Trans Inf Forensics Secur 9(3):436\u2013450","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2313_CR18","doi-asserted-by":"crossref","unstructured":"Mashayekhy L, Nejad MM, Grosu D, Vasilakos AV (2014) Incentive-compatible online mechanisms for resource provisioning and allocation in clouds. In: 2014 IEEE international conference on cloud computing, pp 312\u2013319","DOI":"10.1109\/CLOUD.2014.50"},{"issue":"4","key":"2313_CR19","doi-asserted-by":"crossref","first-page":"1172","DOI":"10.1109\/TC.2015.2444843","volume":"65","author":"L Mashayekhy","year":"2016","unstructured":"Mashayekhy L, Nejad MM, Grosu D, Vasilakos AV (2016) An online mechanism for resource allocation and pricing in clouds. IEEE Trans Comput 65(4):1172\u20131184","journal-title":"IEEE Trans Comput"},{"key":"2313_CR20","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of applied cryptography","author":"A Menezes","year":"1996","unstructured":"Menezes A, Oorschot PV, Vanstone S (1996) Handbook of applied cryptography. CRC Press, Boca Raton"},{"issue":"9","key":"2313_CR21","doi-asserted-by":"crossref","first-page":"1339","DOI":"10.1016\/j.camwa.2012.01.041","volume":"65","author":"L Ni","year":"2012","unstructured":"Ni L, Chen GL, Li JH (2012) Escrowable identity-based authenticated key agreement protocol with strong security. Comput Math Appl 65(9):1339\u20131349","journal-title":"Comput Math Appl"},{"issue":"2","key":"2313_CR22","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120\u2013126","journal-title":"Commun ACM"},{"key":"2313_CR23","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"CP Schnorr","year":"1991","unstructured":"Schnorr CP (1991) Efficient signature generation for smart cards. J Cryptol 4:161\u2013174","journal-title":"J Cryptol"},{"key":"2313_CR24","unstructured":"SISGO (2015) http:\/\/www.sisgo.com.tw\/ . Accessible 18 Nov 18 2015"},{"key":"2313_CR25","unstructured":"Song H (2011) The B2C group-buying model on the Internet. In: Proceedings of 2011 $$2^{{\\rm nd}}$$ 2 nd international conference on artificial intelligence, management science and electronic commerce (AIMSEC). Beijing, China, pp 7335\u20137340"},{"key":"2313_CR26","doi-asserted-by":"crossref","first-page":"1839","DOI":"10.1016\/j.jnca.2012.07.008","volume":"35","author":"Z Tan","year":"2012","unstructured":"Tan Z (2012) A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments. J Netw Comput Appl 35:1839\u20131846","journal-title":"J Netw Comput Appl"},{"key":"2313_CR27","doi-asserted-by":"crossref","unstructured":"Tsvetovat M, Sycara K, Chen Y, Ying J (2001) Customer coalitions in the electronic marketplace, lecture notes in computer science; vol 2003, agent-mediated electronic commerce III, current issues in agent-based electronic commerce systems (includes revised papers from AMEC 2000 Workshop), pp 121\u2013138","DOI":"10.1007\/3-540-44723-7_9"},{"key":"2313_CR28","unstructured":"Twongo (2015) http:\/\/www.twongo.com\/ . Accessible 18 Nov 2015"},{"key":"2313_CR29","doi-asserted-by":"publisher","unstructured":"Wang YL, Chen LS, Leung HF, Hu CY, Chen BJ (2015) Fairness in secure computing protocols based on incentives. Soft computing. Springer, New York. doi: 10.1007\/s00500-015-1974-0","DOI":"10.1007\/s00500-015-1974-0"},{"key":"2313_CR30","doi-asserted-by":"crossref","unstructured":"Wei LF, Zhu HJ, Cao ZF, Jia WW, Vasilakos AV (2010) SecCloud: bridging secure storage and computation in Cloud. In: 2010 IEEE 30th international conference on distributed computing systems workshops, pp 52\u201361","DOI":"10.1109\/ICDCSW.2010.36"},{"key":"2313_CR31","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1016\/j.ins.2013.04.028","volume":"258","author":"LF Wei","year":"2014","unstructured":"Wei LF, Zhu HJ, Cao ZF, Dong XL, Jia WW, Chen YL, Vasilakos AV (2014) Security and privacy for storage and computation in cloud computing. Inf Sci 258:371\u2013386","journal-title":"Inf Sci"},{"key":"2313_CR32","doi-asserted-by":"crossref","unstructured":"Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for Internet of Things. J Netw Comput Appl 42:120\u2013134","DOI":"10.1016\/j.jnca.2014.01.014"},{"key":"2313_CR33","doi-asserted-by":"publisher","unstructured":"Yan Z, Li XY, Wang MJ, Vasilakos AV (2015) Flexible data access control based on trust and reputation in cloud computing. IEEE Trans Cloud Comput. doi: 10.1109\/TCC.2015.2469662","DOI":"10.1109\/TCC.2015.2469662"},{"key":"2313_CR34","doi-asserted-by":"crossref","unstructured":"Yan Z, Ding WX, Niemi V, Vasilakos AV (2016) Two schemes of privacy-preserving trust evaluation. future Gener Comput Syst 62:175\u2013189","DOI":"10.1016\/j.future.2015.11.006"},{"key":"2313_CR35","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.comnet.2013.08.020","volume":"58","author":"HM Yang","year":"2014","unstructured":"Yang HM, Zhang YX, Zhou YZ, Fu XM, Liu H, Vasilakos AV (2014) Provably secure three-party authenticated key agreement protocol using smart cards. Comput Netw 58:29\u201338","journal-title":"Comput Netw"},{"key":"2313_CR36","unstructured":"Yipit (2015) http:\/\/yipit.com\/ . Accessible 18 Nov 2015"},{"key":"2313_CR37","doi-asserted-by":"crossref","unstructured":"Zhang H, Li B, Jiang HB, Liu FM, Vasilakos AV, Liu JC (2013) A Framework for Truthful online auctions in cloud computing with heterogeneous user demands. In: 2013 Proceedings IEEE INFOCOM, pp 1510\u20131518","DOI":"10.1109\/INFCOM.2013.6566946"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-016-2313-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-016-2313-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-016-2313-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-016-2313-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T13:23:51Z","timestamp":1568294631000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-016-2313-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,12]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["2313"],"URL":"https:\/\/doi.org\/10.1007\/s00500-016-2313-9","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,12]]}}}