-
4
-
-
34547263132
-
Protocol completion incentive problems in cryptographic Vickrey auctions
-
3-2004, Rutgers Center for Operations Research RUTCOR
-
P. G. Bradford, S. Park, and M. H. Rothkopf. Protocol completion incentive problems in cryptographic Vickrey auctions. Technical Report RRR 3-2004, Rutgers Center for Operations Research (RUTCOR), 2004.
-
(2004)
Technical Report RRR
-
-
Bradford, P.G.1
Park, S.2
Rothkopf, M.H.3
-
5
-
-
34547302997
-
How to obtain full privacy in auctions
-
Technical report, Carnegie Mellon University
-
F. Brandt. How to obtain full privacy in auctions. Technical report, Carnegie Mellon University, 2005.
-
(2005)
-
-
Brandt, F.1
-
8
-
-
0002908662
-
A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
-
I. Damgård and M. Jurik. A generalisation, a simplification and some applications of Paillier's probabilistic public-key system. In Proc. Public Key Cryptography 01, 2001.
-
(2001)
Proc. Public Key Cryptography 01
-
-
Damgård, I.1
Jurik, M.2
-
9
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Information Theory, IT-31(4):469-472, 1985.
-
(1985)
IEEE Trans. Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
17
-
-
70450129942
-
LiDIA - a library for computational number theory
-
LiDIA-Group
-
LiDIA-Group. LiDIA - a library for computational number theory. TU Darmstadt, 2001.
-
(2001)
TU Darmstadt
-
-
-
19
-
-
0040952956
-
Vickrey auctions in practice: From nineteenth century philately to twenty-first century e-commerce
-
D. Lucking-Reiley. Vickrey auctions in practice: From nineteenth century philately to twenty-first century e-commerce. J. of Economic Perspectives, 14:182-192, 2000.
-
(2000)
J. of Economic Perspectives
, vol.14
, pp. 182-192
-
-
Lucking-Reiley, D.1
-
23
-
-
33746911297
-
-
National Institute of Standards and Technology, FIPS PUB
-
National Institute of Standards and Technology. Secure hash signature standard. http://carc.nist.gov/publications/fips/fips180-2/fips180- 2withchangenotice.pdf, 2002. FIPS PUB 180-2.
-
(2002)
Secure hash signature standard
, pp. 180-182
-
-
-
25
-
-
0000277371
-
Public-key cryptosystems based on composite residuosity classes
-
P. Paillier. Public-key cryptosystems based on composite residuosity classes. In Proc. EUROCRYPT '99, pages 223-239, 1999.
-
(1999)
Proc. EUROCRYPT '99
, pp. 223-239
-
-
Paillier, P.1
-
26
-
-
0010277907
-
Digitalized signatures
-
Academic Press, New York
-
M. O. Rabin. Digitalized signatures. In Foundations of Secure Computing, pages 155-166. Academic Press, New York, 1978.
-
(1978)
Foundations of Secure Computing
, pp. 155-166
-
-
Rabin, M.O.1
-
27
-
-
34547330606
-
-
M. O. Rabin. Digitalized signatures and public-key functions as intractable as factorization. Technical Report MIT/LCS/TR-212, MIT Laboratory for Computer Science, 1979.
-
M. O. Rabin. Digitalized signatures and public-key functions as intractable as factorization. Technical Report MIT/LCS/TR-212, MIT Laboratory for Computer Science, 1979.
-
-
-
-
29
-
-
34547340716
-
-
R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Technical Report MIT/LCS/TM-82, MIT Laboratory for Computer Science, 1977.
-
R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Technical Report MIT/LCS/TM-82, MIT Laboratory for Computer Science, 1977.
-
-
-
-
30
-
-
0010602889
-
Time-lock puzzles and timed release crypto
-
Technical Report MIT/LCS/TR-684, MIT, 1996
-
R. L. Rivest, A. Shamir, and D. A. Wagner. Time-lock puzzles and timed release crypto. Technical Report MIT/LCS/TR-684, MIT, 1996.
-
-
-
Rivest, R.L.1
Shamir, A.2
Wagner, D.A.3
-
32
-
-
33750696788
-
Changing the game in strategic sourcing at Procter & Gamble: Expressive competition enabled by optimization
-
T. Sandholm, D. Levine, M. Concordia, P. Martyn, R. Hughes, J. Jacobes, and D. Begg. Changing the game in strategic sourcing at Procter & Gamble: Expressive competition enabled by optimization. Interfaces, 36(1):55-68, 2006.
-
(2006)
Interfaces
, vol.36
, Issue.1
, pp. 55-68
-
-
Sandholm, T.1
Levine, D.2
Concordia, M.3
Martyn, P.4
Hughes, R.5
Jacobes, J.6
Begg, D.7
-
35
-
-
26444446019
-
Secure generalized Vickrey auction using homomorphic encryption
-
K. Suzuki and M. Yokoo. Secure generalized Vickrey auction using homomorphic encryption. In Proc. Financial Cryptography, 2003.
-
(2003)
Proc. Financial Cryptography
-
-
Suzuki, K.1
Yokoo, M.2
-
36
-
-
34547376855
-
Receipt-free electronic auction schemes using homomorphic encryption
-
B. L. Xiaofeng Chen, Kwangjo Kim. Receipt-free electronic auction schemes using homomorphic encryption. In ICISC, 2003.
-
(2003)
ICISC
-
-
Xiaofeng Chen, B.L.1
Kim, K.2
-
37
-
-
0036367593
-
Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions
-
M. Yokoo and K. Suzuki. Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions. In Proc. First Int. Conf. on Autonomous Agents and Multiagent Systems, 2002.
-
(2002)
Proc. First Int. Conf. on Autonomous Agents and Multiagent Systems
-
-
Yokoo, M.1
Suzuki, K.2
|