-
1
-
-
84980096808
-
Counter speculation, auctions, and competitive sealed tenders
-
Vickrey, W.: Counter speculation, auctions, and competitive sealed tenders. Journal of Finance 16 (1961) 8-37
-
(1961)
Journal of Finance
, vol.16
, pp. 8-37
-
-
Vickrey, W.1
-
2
-
-
84935607379
-
Why are Vickrey auctions rare?
-
Rothkopf, M., Teisberg, T., Kahn, E.: Why are Vickrey auctions rare? Journal of Political Economy 98 (1990) 94-109
-
(1990)
Journal of Political Economy
, vol.98
, pp. 94-109
-
-
Rothkopf, M.1
Teisberg, T.2
Kahn, E.3
-
3
-
-
21844516729
-
Two models of bid-taker cheating in Vickrey auctions
-
Rothkopf, M., Harstad, R.: Two models of bid-taker cheating in Vickrey auctions. Journal of Business 68 (1995) 257-267
-
(1995)
Journal of Business
, vol.68
, pp. 257-267
-
-
Rothkopf, M.1
Harstad, R.2
-
5
-
-
14344268394
-
Vicious strategies for Vickrey auctions
-
Müller, J., Andre, E., Sen, S., Frasson, C., eds.: ACM Press
-
Brandt, F., Weiß, G.: Vicious strategies for Vickrey auctions. In Müller, J., Andre, E., Sen, S., Frasson, C., eds.: Proceedings of the 5th International Conference on Autonomous Agents, ACM Press (2001) 71-72
-
(2001)
Proceedings of the 5th International Conference on Autonomous Agents
, pp. 71-72
-
-
Brandt, F.1
Weiß, G.2
-
6
-
-
84901711735
-
Antisocial agents and Vickrey auctions
-
Meyer, J.J.C., Tambe, M., eds.: Intelligent Agents VIII. Springer Revised papers from the 8th Workshop on Agent Theories, Architectures and Languages
-
Brandt, F., Weiß, G.: Antisocial agents and Vickrey auctions. In Meyer, J.J.C., Tambe, M., eds.: Intelligent Agents VIII. Volume 2333 of Lecture Notes in Artificial Intelligence., Springer (2001) 335-347 Revised papers from the 8th Workshop on Agent Theories, Architectures and Languages.
-
(2001)
Lecture Notes in Artificial Intelligence
, vol.2333
, pp. 335-347
-
-
Brandt, F.1
Weiß, G.2
-
7
-
-
84937394850
-
Cryptographic protocols for secure second-price auctions
-
Klusch, M., Zambonelli, F., eds.: Cooperative Information Agents V. Springer
-
Brandt, F.: Cryptographic protocols for secure second-price auctions. In Klusch, M., Zambonelli, F., eds.: Cooperative Information Agents V. Volume 2182 of Lecture Notes in Artificial Intelligence., Springer (2001) 154-165
-
(2001)
Lecture Notes in Artificial Intelligence
, vol.2182
, pp. 154-165
-
-
Brandt, F.1
-
8
-
-
0032208665
-
Flexible double auctions for electronic commerce: Theory and implementation
-
Wurman, P., Walsh, W., Wellman, M.: Flexible double auctions for electronic commerce: Theory and implementation. Decision Support Systems 24 (1998) 17-27
-
(1998)
Decision Support Systems
, vol.24
, pp. 17-27
-
-
Wurman, P.1
Walsh, W.2
Wellman, M.3
-
10
-
-
84958964379
-
M+1-st price auction using homomorphic encryption
-
Proceedings of the 5th International Conference on Public Key Cryptography (PKC). Springer
-
Abe, M., Suzuki, K.: M+1-st price auction using homomorphic encryption. In: Proceedings of the 5th International Conference on Public Key Cryptography (PKC). Volume 2274 of Lecture Notes in Computer Science., Springer (2002) 115-224
-
(2002)
Lecture Notes in Computer Science
, vol.2274
, pp. 115-224
-
-
Abe, M.1
Suzuki, K.2
-
11
-
-
84945256706
-
Receipt-free sealed-bid auction
-
Proceedings of the 1st Information Security Conference (ISC).
-
Abe, M., Suzuki, K.: Receipt-free sealed-bid auction. In: Proceedings of the 1st Information Security Conference (ISC). Volume 2433 of Lecture Notes in Computer Science. (2002) 191-199
-
(2002)
Lecture Notes in Computer Science
, vol.2433
, pp. 191-199
-
-
Abe, M.1
Suzuki, K.2
-
16
-
-
80555144158
-
(M+1)st-price auction protocol
-
Proceedings of the 5th Annual Conference on Financial Cryptography (FC). Springer
-
Kikuchi, H.: (M+1)st-price auction protocol. In: Proceedings of the 5th Annual Conference on Financial Cryptography (FC). Volume 2339 of Lecture Notes in Computer Science., Springer (2001) 351-363
-
(2001)
Lecture Notes in Computer Science
, vol.2339
, pp. 351-363
-
-
Kikuchi, H.1
-
18
-
-
84961626294
-
Resolving winner and winning bid without revealing privacy of bids
-
Kikuchi, H., Hotta, S., Abe, K., Nakanishi, S.: Resolving winner and winning bid without revealing privacy of bids. In: Proceedings of the International Workshop on Next Generation Internet (NGITA). (2000) 307-312
-
(2000)
Proceedings of the International Workshop on next Generation Internet (NGITA)
, pp. 307-312
-
-
Kikuchi, H.1
Hotta, S.2
Abe, K.3
Nakanishi, S.4
-
19
-
-
0031679773
-
Secure electronic sealed-bid auction protocol with public key cryptography
-
Kudo, M.: Secure electronic sealed-bid auction protocol with public key cryptography. IEICE Trans. Fundamentals E81-A (1998)
-
(1998)
IEICE Trans. Fundamentals
, vol.E81-A
-
-
Kudo, M.1
-
20
-
-
84957026937
-
Secure Vickrey auctions without threshold trust
-
Blaze, M., ed.: Proceedings of the 6th Annual Conference on Financial Cryptography (FC). Springer
-
Lipmaa, H., Asokan, N., Niemi, V.: Secure Vickrey auctions without threshold trust. In Blaze, M., ed.: Proceedings of the 6th Annual Conference on Financial Cryptography (FC). Volume 2357 of Lecture Notes in Computer Science., Springer (2002)
-
(2002)
Lecture Notes in Computer Science
, vol.2357
-
-
Lipmaa, H.1
Asokan, N.2
Niemi, V.3
-
22
-
-
35248870807
-
An auction protocol which hides bids of losers
-
Proceedings of the 3rd International Conference on Public Key Cryptography (PKC). Springer
-
Sako, K.: An auction protocol which hides bids of losers. In: Proceedings of the 3rd International Conference on Public Key Cryptography (PKC). Volume 1751 of Lecture Notes in Computer Science., Springer (2000) 422-432
-
(2000)
Lecture Notes in Computer Science
, vol.1751
, pp. 422-432
-
-
Sako, K.1
-
23
-
-
0005038557
-
A bulletin-board based digital auction scheme with bidding down strategy - Towards anonymous electronic bidding without anonymous channels nor trusted centers
-
Sakurai, K., Miyazaki, S.: A bulletin-board based digital auction scheme with bidding down strategy - towards anonymous electronic bidding without anonymous channels nor trusted centers. In: Proceedings of the International Workshop on Cryptographic Techniques and E-Commerce. (1999) 180-187
-
(1999)
Proceedings of the International Workshop on Cryptographic Techniques and E-Commerce
, pp. 180-187
-
-
Sakurai, K.1
Miyazaki, S.2
-
25
-
-
84958975522
-
A three phased schema for sealed bid auction system design
-
Proceedings of the Australasian Conference for Information Security and Privacy (ACISP)
-
Viswanathan, K., Boyd, C., Dawson, E.: A three phased schema for sealed bid auction system design. In: Proceedings of the Australasian Conference for Information Security and Privacy (ACISP). Lecture Notes in Computer Science (2000) 412-426
-
(2000)
Lecture Notes in Computer Science
, pp. 412-426
-
-
Viswanathan, K.1
Boyd, C.2
Dawson, E.3
-
27
-
-
0010117654
-
An anonymous electronic bidding protocol based on a new convertible group signature scheme
-
Proceedings of the 5th Australasian Conference on Information Security and Privacy (ACISP2000)
-
Sakurai, K., Miyazaki, S.: An anonymous electronic bidding protocol based on a new convertible group signature scheme. In: Proceedings of the 5th Australasian Conference on Information Security and Privacy (ACISP2000). Lecture Notes in Computer Science (2000)
-
(2000)
Lecture Notes in Computer Science
-
-
Sakurai, K.1
Miyazaki, S.2
-
29
-
-
12344258539
-
Efficient signature generation by smart cards
-
Schnorr, C.P.: Efficient signature generation by smart cards. Journal of Cryptology 4 (1991) 161-174
-
(1991)
Journal of Cryptology
, vol.4
, pp. 161-174
-
-
Schnorr, C.P.1
-
30
-
-
0002187137
-
Wallet databases with observers
-
Advances in Cryptology - Proceedings of the 12th Annual International Cryptology Conference (CRYPTO). Springer
-
Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Advances in Cryptology - Proceedings of the 12th Annual International Cryptology Conference (CRYPTO). Volume 740 of Lecture Notes in Computer Science., Springer (1992) 3.1-3.6
-
(1992)
Lecture Notes in Computer Science
, vol.740
-
-
Chaum, D.1
Pedersen, T.P.2
-
31
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Advances in Cryptology - Proceedings of the 14th Annual International Cryptology Conference (CRYPTO). Springer
-
Cramer, R., Damgård, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: Advances in Cryptology - Proceedings of the 14th Annual International Cryptology Conference (CRYPTO). Volume 893 of Lecture Notes in Computer Science., Springer (1994) 174-187
-
(1994)
Lecture Notes in Computer Science
, vol.893
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
32
-
-
1142304946
-
A verifiable, bidder-resolved auction protocol
-
Falcone, R., Barber, S., Korba, L., Singh, M., eds.
-
Brandt, F.: A verifiable, bidder-resolved auction protocol. In Falcone, R., Barber, S., Korba, L., Singh, M., eds.: Proceedings of the 5th International Workshop on Deception, Fraud and Trust in Agent Societies (Special Track on Privacy and Protection with Multi-Agent Systems). (2002) 18-25
-
(2002)
Proceedings of the 5th International Workshop on Deception, Fraud and Trust in Agent Societies (Special Track on Privacy and Protection with Multi-Agent Systems)
, pp. 18-25
-
-
Brandt, F.1
-
33
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31 (1985) 469-472
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
34
-
-
84958979582
-
On the security of ElGamal-based encryption
-
Proceedings of the 1st International Workshop on Practice and Theory in Public Key Cryptography (PKC). Springer
-
Tsiounis, Y., Yung, M.: On the security of ElGamal-based encryption. In: Proceedings of the 1st International Workshop on Practice and Theory in Public Key Cryptography (PKC). Volume 1431 of Lecture Notes in Computer Science., Springer (1998) 117-134
-
(1998)
Lecture Notes in Computer Science
, vol.1431
, pp. 117-134
-
-
Tsiounis, Y.1
Yung, M.2
-
35
-
-
0242708796
-
Social choice and preference protection - Towards fully private mechanism design
-
ACM Press to appear
-
Brandt, F.: Social choice and preference protection - Towards fully private mechanism design. In: Proceedings of the 4th ACM Conference on Electronic Commerce, ACM Press (2003) to appear.
-
(2003)
Proceedings of the 4th ACM Conference on Electronic Commerce
-
-
Brandt, F.1
-
36
-
-
35248880750
-
-
Technical Report FKI-247-03, Department for Computer Science, Technical University of Munich
-
Brandt, F.: Private public choice. Technical Report FKI-247-03, Department for Computer Science, Technical University of Munich (2003)
-
(2003)
Private Public Choice
-
-
Brandt, F.1
-
37
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
Advances in Cryptology - Proceedings of the 18th Eurocrypt Conference. Springer
-
Cramer, R., Damgård, I., Nielsen, J.B.: Multiparty computation from threshold homomorphic encryption. In: Advances in Cryptology - Proceedings of the 18th Eurocrypt Conference. Volume 2045 of Lecture Notes in Computer Science., Springer (2001)
-
(2001)
Lecture Notes in Computer Science
, vol.2045
-
-
Cramer, R.1
Damgård, I.2
Nielsen, J.B.3
-
38
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Advances in Cryptology - Proceedings of the 16th Eurocrypt Conference. Springer
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology - Proceedings of the 16th Eurocrypt Conference. Volume 1592 of Lecture Notes in Computer Science., Springer (1999) 223-238
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
39
-
-
84937431456
-
Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
-
Advances in Cryptology - Proceedings of the 22th Annual International Cryptology Conference (CRYPTO). Springer
-
Algesheimer, J., Camenisch, J., Shoup, V.: Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. In: Advances in Cryptology - Proceedings of the 22th Annual International Cryptology Conference (CRYPTO). Volume 2442 of Lecture Notes in Computer Science., Springer (2002) 417-432
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 417-432
-
-
Algesheimer, J.1
Camenisch, J.2
Shoup, V.3
-
41
-
-
84945127249
-
Practical threshold RSA signatures without a trusted dealer
-
Advances in Cryptology - Proceedings of the 18th Eurocrypt Conference. Springer
-
Damgård, I., Koprowski, M.: Practical threshold RSA signatures without a trusted dealer. In: Advances in Cryptology - Proceedings of the 18th Eurocrypt Conference. Volume 2045 of Lecture Notes in Computer Science., Springer (2001) 152-165
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 152-165
-
-
Damgård, I.1
Koprowski, M.2
|