-
1
-
-
0003917730
-
-
[Arrow, 1963] New Haven: Cowles Foundation, 2nd edition, 1963. 1st edition
-
[Arrow, 1963] K. Arrow. Social choice and individual values. New Haven: Cowles Foundation, 2nd edition, 1963. 1st edition 1951.
-
(1951)
Social Choice and Individual Values
-
-
Arrow, K.1
-
2
-
-
0000733155
-
The computational difficulty of manipulating an election
-
[Bartholdi, III et al., 1989a]
-
[Bartholdi, III et al., 1989a] J. Bartholdi, III, C. A. Tovey, and M. A. Trick. The computational difficulty of manipulating an election. Social Choice and Welfare, 6(3):227-241, 1989.
-
(1989)
Social Choice and Welfare
, vol.6
, Issue.3
, pp. 227-241
-
-
Bartholdi III, J.1
Tovey, C.A.2
Trick, M.A.3
-
3
-
-
0012257673
-
Voting schemes for which it can be difficult to tell who won the election
-
[Bartholdi, III et al., 1989b]
-
[Bartholdi, III et al., 1989b] J. Bartholdi, III, C. A. Tovey, and M. A. Trick. Voting schemes for which it can be difficult to tell who won the election. Social Choice and Welfare, 6(3):157-165, 1989.
-
(1989)
Social Choice and Welfare
, vol.6
, Issue.3
, pp. 157-165
-
-
Bartholdi III, J.1
Tovey, C.A.2
Trick, M.A.3
-
4
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
[Ben-Or et al., 1988] ACM Press
-
[Ben-Or et al., 1988] M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proceedings of the 20th Annual ACM Symposium on the Theory of Computing (STOC), pages 1-10. ACM Press, 1988.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on the Theory of Computing (STOC)
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
5
-
-
85034837254
-
Secret sharing homomorphisms: Keeping shares of a secret secret
-
[Benaloh, 1987] Advances in Cryptology - Proceedings of the 13th Annual International Cryptology Conference (CRYPTO), Springer
-
[Benaloh, 1987] J. Benaloh. Secret sharing homomorphisms: Keeping shares of a secret secret. In Advances in Cryptology - Proceedings of the 13th Annual International Cryptology Conference (CRYPTO), volume 263 of Lecture Notes in Computer Science (LNCS), pages 251-260. Springer, 1987.
-
(1987)
Lecture Notes in Computer Science (LNCS)
, vol.263
, pp. 251-260
-
-
Benaloh, J.1
-
6
-
-
4544319920
-
(Im)possibility of unconditionally privacy-preserving auctions
-
[Brandt and Sandholm, 2004] C. Sierra and L. Sonenberg, editors, ACM Press
-
[Brandt and Sandholm, 2004] F. Brandt and T. Sandholm. (Im)possibility of unconditionally privacy-preserving auctions. In C. Sierra and L. Sonenberg, editors, Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS), pages 810-817. ACM Press, 2004.
-
(2004)
Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS)
, pp. 810-817
-
-
Brandt, F.1
Sandholm, T.2
-
7
-
-
33644801041
-
Decentralized voting with unconditional privacy
-
[Brandt and Sandholm, 2005] S. Koenig and M. Wooldridge, editors, ACM Press, To Appear
-
[Brandt and Sandholm, 2005] F. Brandt and T. Sandholm. Decentralized voting with unconditional privacy. In S. Koenig and M. Wooldridge, editors, Proceedings of the 4th International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS). ACM Press, 2005. To Appear.
-
(2005)
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS)
-
-
Brandt, F.1
Sandholm, T.2
-
8
-
-
84898947315
-
Multi-party unconditionally secure protocols
-
[Chaum et al., 1988] ACM Press
-
[Chaum et al., 1988] D. Chaum, C. Crépeau, and I. Damgård. Multi-party unconditionally secure protocols. In Proceedings of the 20th Annual ACM Symposium on the Theory of Computing (STOC), pages 11-19. ACM Press, 1988.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on the Theory of Computing (STOC)
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
9
-
-
85034632918
-
Elections with unconditionally-secret ballots and disruption equivalent to breaking RSA
-
[Chaum, 1988] Proceedings of the 5th Eurocrypt Conference, Springer
-
[Chaum, 1988] D. Chaum. Elections with unconditionally-secret ballots and disruption equivalent to breaking RSA. In Proceedings of the 5th Eurocrypt Conference, volume 330 of Lecture Notes in Computer Science (LNCS), pages 177-182. Springer, 1988.
-
(1988)
Lecture Notes in Computer Science (LNCS)
, vol.330
, pp. 177-182
-
-
Chaum, D.1
-
11
-
-
0028675686
-
On the structure of the privacy hierarchy
-
[Chor et al., 1994]
-
[Chor et al., 1994] B. Chor, M. Geréb-Graus, and E. Kushilevitz. On the structure of the privacy hierarchy. Journal of Cryptology, 7(1):53-60, 1994.
-
(1994)
Journal of Cryptology
, vol.7
, Issue.1
, pp. 53-60
-
-
Chor, B.1
Geréb-Graus, M.2
Kushilevitz, E.3
-
13
-
-
0017018484
-
New directions in cryptography
-
[Diffie and Hellman, 1976]
-
[Diffie and Hellman, 1976] W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6):644-654, 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
14
-
-
0001195563
-
Manipulation of voting schemes
-
[Gibbard, 1973]
-
[Gibbard, 1973] A. Gibbard. Manipulation of voting schemes. Econometrica, 41:587-602, 1973.
-
(1973)
Econometrica
, vol.41
, pp. 587-602
-
-
Gibbard, A.1
-
15
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
[Goldreich et al., 1987] ACM Press
-
[Goldreich et al., 1987] O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In Proceedings of the 19th Annual ACM Symposium on the Theory of Computing (STOC), pages 218-229. ACM Press, 1987.
-
(1987)
Proceedings of the 19th Annual ACM Symposium on the Theory of Computing (STOC)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
16
-
-
0031269788
-
Exact analysis of Dodgson elections: Lewis Carroll's 1876 voting system is complete for parallel access to NP
-
[Hemaspaandra et al., 1997]
-
[Hemaspaandra et al., 1997] E. Hemaspaandra, L. Hemaspaandra, and J. Rothe. Exact analysis of Dodgson elections: Lewis Carroll's 1876 voting system is complete for parallel access to NP. Journal of the ACM, 44(6):806-825, 1997.
-
(1997)
Journal of the ACM
, vol.44
, Issue.6
, pp. 806-825
-
-
Hemaspaandra, E.1
Hemaspaandra, L.2
Rothe, J.3
-
19
-
-
0041492960
-
Exact complexity of the winner problem for Young elections
-
[Rothe et al., 2003]
-
[Rothe et al., 2003] J. Rothe, H. Spakowski, and J. Vogel. Exact complexity of the winner problem for Young elections. Theory of Computing Systems, 36(4):375-386, 2003.
-
(2003)
Theory of Computing Systems
, vol.36
, Issue.4
, pp. 375-386
-
-
Rothe, J.1
Spakowski, H.2
Vogel, J.3
-
20
-
-
49549141769
-
Strategy-proofness and Arrow's conditions: Existence and correspondence theorems for voting procedures and social welfare functions
-
[Satterthwaite, 1975]
-
[Satterthwaite, 1975] M. A. Satterthwaite. Strategy-proofness and Arrow's conditions: Existence and correspondence theorems for voting procedures and social welfare functions. Journal of Economic Theory, 10:187-217, 1975.
-
(1975)
Journal of Economic Theory
, vol.10
, pp. 187-217
-
-
Satterthwaite, M.A.1
-
22
-
-
0000381950
-
A consistent extension of Condorcet's election principle
-
[Young and Levenglick, 1978]
-
[Young and Levenglick, 1978] H. Young and A. Levenglick. A consistent extension of Condorcet's election principle. SIAM Journal on Applied Mathematics, 35(2):285-300, 1978.
-
(1978)
SIAM Journal on Applied Mathematics
, vol.35
, Issue.2
, pp. 285-300
-
-
Young, H.1
Levenglick, A.2
|