-
1
-
-
84958964379
-
M+1-st price auction using homomorphic encryption
-
Proceedings of Public Key Cryptography 2002
-
Masayuki Abe and Koutarou Suzuki. M+1-st price auction using homomorphic encryption. Proceedings of Public Key Cryptography 2002, pages 115-124, 2002. Springer LNCS 2274.
-
(2002)
Springer LNCS
, vol.2274
, pp. 115-124
-
-
Abe, M.1
Suzuki, K.2
-
2
-
-
84949207060
-
Non-interactive private auctions
-
Proceedings of Financial Cryptography 2001
-
O. Baudron and J. Stern. Non-interactive private auctions. Proceedings of Financial Cryptography 2001, pages 364-377, 2001. Springer LNCS 2339.
-
(2001)
Springer LNCS
, vol.2339
, pp. 364-377
-
-
Baudron, O.1
Stern, J.2
-
5
-
-
84947288202
-
Efficient sealed-bid auctions for massive numbers of bidders with lump comparison
-
Proceedings of Information Security Conference 2001
-
K. Chida, K. Kobayashi, and H. Morita. Efficient sealed-bid auctions for massive numbers of bidders with lump comparison. Proceedings of Information Security Conference 2001, pages 408-419, 2001. Springer LNCS 2200.
-
(2001)
Springer LNCS
, vol.2200
, pp. 408-419
-
-
Chida, K.1
Kobayashi, K.2
Morita, H.3
-
6
-
-
34250446073
-
Multipart pricing of public goods
-
E. H. Clarke. Multipart pricing of public goods. Public Choice, 2:19-33, 1971.
-
(1971)
Public Choice
, vol.2
, pp. 19-33
-
-
Clarke, E.H.1
-
9
-
-
0001314984
-
Incentives in teams
-
Theodore Groves. Incentives in teams. Econometrica, 41:617-631, 1973.
-
(1973)
Econometrica
, vol.41
, pp. 617-631
-
-
Groves, T.1
-
11
-
-
84957011768
-
A two-server, sealed-bid auction protocol
-
Proceedings of Financial Cryptography 2002
-
A. Juels and M. Szydlo. A two-server, sealed-bid auction protocol. Proceedings of Financial Cryptography 2002, pages 72-86, 2002. Springer LNCS 2357.
-
(2002)
Springer LNCS
, vol.2357
, pp. 72-86
-
-
Juels, A.1
Szydlo, M.2
-
12
-
-
80555144158
-
(m+1)st-price auction protocol
-
Proceedings of Financial Cryptography 2001
-
H. Kikuchi. (m+1)st-price auction protocol. Proceedings of Financial Cryptography 2001, pages 351-363, 2001. Springer LNCS 2339.
-
(2001)
Springer LNCS
, vol.2339
, pp. 351-363
-
-
Kikuchi, H.1
-
14
-
-
0032804976
-
Auction theory: A guide to the literature
-
Paul Klemperer. Auction theory: A guide to the literature. Journal of Economics Surveys, 13(3):227-286, 1999.
-
(1999)
Journal of Economics Surveys
, vol.13
, Issue.3
, pp. 227-286
-
-
Klemperer, P.1
-
15
-
-
0035123193
-
Efficient sealed-bid auction by using one-way functions
-
Kunio Kobayashi, Hikaru Morita, Koutarou Suzuki, and Mitsuari Hakuta. Efficient sealed-bid auction by using one-way functions. IEICE Trans. Fundamentals, E84-A(1):289-294, 2001.
-
(2001)
IEICE Trans. Fundamentals
, vol.E84-A
, Issue.1
, pp. 289-294
-
-
Kobayashi, K.1
Morita, H.2
Suzuki, K.3
Hakuta, M.4
-
17
-
-
0031679773
-
Secure electronic sealed-bid auction protocol with public key cryptography
-
M. Kudo. Secure electronic sealed-bid auction protocol with public key cryptography. IEICE Trans. Fundamentals, E81-A(1):20-27, 1998.
-
(1998)
IEICE Trans. Fundamentals
, vol.E81-A
, Issue.1
, pp. 20-27
-
-
Kudo, M.1
-
20
-
-
84957026937
-
Secure vickrey auctions without threshold trust
-
Proceedings of Financial Cryptography 2002
-
H. Lipmaa, N. Asokan, and V. Niemi. Secure vickrey auctions without threshold trust. Proceedings of Financial Cryptography 2002, pages 87-101, 2002. Springer LNCS 2357.
-
(2002)
Springer LNCS
, vol.2357
, pp. 87-101
-
-
Lipmaa, H.1
Asokan, N.2
Niemi, V.3
-
23
-
-
84944238875
-
An anonymous auction protocol with a single non-trusted center using binary trees
-
Proceedings of Information Security Workshop 2000
-
K. Omote and A. Miyaji. An anonymous auction protocol with a single non-trusted center using binary trees. Proceedings of Information Security Workshop 2000, pages 108-120, 2000. Springer LNCS 1975.
-
(2000)
Springer LNCS
, vol.1975
, pp. 108-120
-
-
Omote, K.1
Miyaji, A.2
-
24
-
-
84957024214
-
A second-price sealed-bid auction with the discriminant of the p-th root
-
Proceedings of Financial Cryptography 2002
-
K. Omote and A. Miyaji. A second-price sealed-bid auction with the discriminant of the p-th root. Proceedings of Financial Cryptography 2002, pages 57-71, 2002. Springer LNCS 2357.
-
(2002)
Springer LNCS
, vol.2357
, pp. 57-71
-
-
Omote, K.1
Miyaji, A.2
-
25
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. Proceedings of EUROCRYPT '99, pages 223-238, 1999.
-
(1999)
Proceedings of EUROCRYPT '99
, pp. 223-238
-
-
Paillier, P.1
-
26
-
-
84935607379
-
Why are vickrey auctions are rare
-
M. H. Rothkopf, T. J. Teisberg, and E. P. Kahn. Why are vickrey auctions are rare. Journal of Political Economy, 98(1):94-109, 1990.
-
(1990)
Journal of Political Economy
, vol.98
, Issue.1
, pp. 94-109
-
-
Rothkopf, M.H.1
Teisberg, T.J.2
Kahn, E.P.3
-
27
-
-
35248870807
-
Universally verifiable auction protocol which hides losing bids
-
Proceedings of Public Key Cryptography 2000
-
K. Sako. Universally verifiable auction protocol which hides losing bids. Proceedings of Public Key Cryptography 2000, pages 422-432, 2000. Springer LNCS 1751.
-
(2000)
Springer LNCS
, vol.1751
, pp. 422-432
-
-
Sako, K.1
-
30
-
-
84880855418
-
CABOB: A fast combinatorial algorithm for optimal combinatorial auctions
-
Tuomas Sandholm, Subhash Suri, Andrew Gilpin, and David Levine. CABOB: A fast combinatorial algorithm for optimal combinatorial auctions. In Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence (IJCAI-2001), pages 1102-1108, 2001.
-
(2001)
Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence (IJCAI-2001)
, pp. 1102-1108
-
-
Sandholm, T.1
Suri, S.2
Gilpin, A.3
Levine, D.4
-
31
-
-
84956867136
-
Fair on-line auctions without special trusted parties
-
Proceedings of Financial Cryptography 1999
-
S. G. Stubblebine and P. F. Syverson. Fair on-line auctions without special trusted parties. Proceedings of Financial Cryptography 1999, pages 230-240, 1999. Springer LNCS 1648.
-
(1999)
Springer LNCS
, vol.1648
, pp. 230-240
-
-
Stubblebine, S.G.1
Syverson, P.F.2
-
32
-
-
84959060612
-
Efficient sealed-bid auction using hash chain
-
Proceedings of International Conference Information Security and Cryptology 2000
-
Koutarou Suzuki, Kunio Kobayashi, and Hikaru Morita. Efficient sealed-bid auction using hash chain. Proceedings of International Conference Information Security and Cryptology 2000, pages 183-191, 2000. Springer LNCS 2015.
-
(2000)
Springer LNCS
, vol.2015
, pp. 183-191
-
-
Suzuki, K.1
Kobayashi, K.2
Morita, H.3
-
33
-
-
84957038963
-
Secure combinatorial auctions by dynamic programming with polynomial secret sharing
-
Proceedings of Financial Cryptography 2002
-
Koutarou Suzuki and Makoto Yokoo. Secure combinatorial auctions by dynamic programming with polynomial secret sharing. Proceedings of Financial Cryptography 2002, pages 44-56, 2002. Springer LNCS 2357.
-
(2002)
Springer LNCS
, vol.2357
, pp. 44-56
-
-
Suzuki, K.1
Yokoo, M.2
-
35
-
-
84980096808
-
Counter speculation, auctions, and competitive sealed tenders
-
William Vickrey. Counter speculation, auctions, and competitive sealed tenders. Journal of Finance, 16:8-37, 1961.
-
(1961)
Journal of Finance
, vol.16
, pp. 8-37
-
-
Vickrey, W.1
-
38
-
-
0035422448
-
Robust combinatorial auction protocol against false-name bids
-
Makoto Yokoo, Yuko Sakurai, and Shigeo Matsubara. Robust combinatorial auction protocol against false-name bids. Artificial Intelligence, 130(2):167-181, 2001.
-
(2001)
Artificial Intelligence
, vol.130
, Issue.2
, pp. 167-181
-
-
Yokoo, M.1
Sakurai, Y.2
Matsubara, S.3
-
39
-
-
0347031344
-
The effect of false-name bids in combinatorial auctions: New fraud in internet auctions
-
forthcoming
-
Makoto Yokoo, Yuko Skurai, and Shigeo Matsubara. The effect of false-name bids in combinatorial auctions: New fraud in internet auctions. Games and Economic Behavior, forthcoming.
-
Games and Economic Behavior
-
-
Yokoo, M.1
Skurai, Y.2
Matsubara, S.3
|