-
1
-
-
52049106923
-
-
M. Abe, K. Suzuki, M + 1-st price auction using homomorphic encryption, in: Proceedings of Public Key Cryptography, 2002.
-
M. Abe, K. Suzuki, M + 1-st price auction using homomorphic encryption, in: Proceedings of Public Key Cryptography, 2002.
-
-
-
-
2
-
-
21844513129
-
Corruption in the North Sea oil industry: issues and assessments
-
Andvig J.C. Corruption in the North Sea oil industry: issues and assessments. Crime, Law & Social Change 23 4 (1995) 289-313
-
(1995)
Crime, Law & Social Change
, vol.23
, Issue.4
, pp. 289-313
-
-
Andvig, J.C.1
-
3
-
-
52049114485
-
-
L. Arozamena, F. Weinschelbaum, The effect of corruption on bidding behavior in first-price auctions, Technical Report, Universidad de San Andres, 2004.
-
L. Arozamena, F. Weinschelbaum, The effect of corruption on bidding behavior in first-price auctions, Technical Report, Universidad de San Andres, 2004.
-
-
-
-
5
-
-
52049116371
-
-
J. Asker, E. Cantillon, Properties of scoring auctions, Technical report, Leonard N. Stern School of Business, 2006.
-
J. Asker, E. Cantillon, Properties of scoring auctions, Technical report, Leonard N. Stern School of Business, 2006.
-
-
-
-
7
-
-
52049120202
-
-
O. Baudron, J. Stern, Non-interactive private auctions, in: Proceedings Financial Cryptography, 2001.
-
O. Baudron, J. Stern, Non-interactive private auctions, in: Proceedings Financial Cryptography, 2001.
-
-
-
-
9
-
-
84948973732
-
-
F. Boudot, Efficient proofs that a committed number lies in an interval, in: Proceedings of Eurocrypt 2000, vol. LNCS 1807, Springer, 2000, p. 431.
-
F. Boudot, Efficient proofs that a committed number lies in an interval, in: Proceedings of Eurocrypt 2000, vol. LNCS 1807, Springer, 2000, p. 431.
-
-
-
-
10
-
-
52049107667
-
-
P.G. Bradford, S. Park, M.H. Rothkopf, Protocol completion incentive problems in cryptographic Vickrey auctions, Technical Report RRR 3-2004, Rutgers Center for Operations Research (RUTCOR), 2004.
-
P.G. Bradford, S. Park, M.H. Rothkopf, Protocol completion incentive problems in cryptographic Vickrey auctions, Technical Report RRR 3-2004, Rutgers Center for Operations Research (RUTCOR), 2004.
-
-
-
-
11
-
-
52049090415
-
-
F. Brandt, How to obtain full privacy in auctions, Technical Report, Carnegie Mellon University, 2005.
-
F. Brandt, How to obtain full privacy in auctions, Technical Report, Carnegie Mellon University, 2005.
-
-
-
-
12
-
-
4544319920
-
-
F. Brandt, T. Sandholm, (Im)possibility of unconditionally privacy-preserving auctions, in: Proceedings of the Third International Conference on Autonomous Agents and Multi- Agent Systems, 2004, pp. 810-817.
-
F. Brandt, T. Sandholm, (Im)possibility of unconditionally privacy-preserving auctions, in: Proceedings of the Third International Conference on Autonomous Agents and Multi- Agent Systems, 2004, pp. 810-817.
-
-
-
-
13
-
-
84949198248
-
-
E. Brickell, D. Chaum, I. Damgård, J. Van de Graaf, Gradual and verifiable release of a secret, in: Proceedings of CRYPTO'87, LNCS, vol. 293, 1988, pp. 156-166.
-
E. Brickell, D. Chaum, I. Damgård, J. Van de Graaf, Gradual and verifiable release of a secret, in: Proceedings of CRYPTO'87, LNCS, vol. 293, 1988, pp. 156-166.
-
-
-
-
15
-
-
52049117465
-
-
R. Burguet, M. Perry, Bribery and favoritism by auctioneers in sealed-bid auctions, Technical Report, Institute of Economic Analysis, UAB, Barcelona, 2003.
-
R. Burguet, M. Perry, Bribery and favoritism by auctioneers in sealed-bid auctions, Technical Report, Institute of Economic Analysis, UAB, Barcelona, 2003.
-
-
-
-
17
-
-
0033280866
-
-
C. Cachin, Efficient private bidding and auctions with an oblivious third party, in: Proceedings of the Sixth ACM Conference on Computer and Comm. Security, 1999, pp. 120-127.
-
C. Cachin, Efficient private bidding and auctions with an oblivious third party, in: Proceedings of the Sixth ACM Conference on Computer and Comm. Security, 1999, pp. 120-127.
-
-
-
-
18
-
-
0036302790
-
Corruption and competition in procurement
-
Celantani M., and Ganuza J.J. Corruption and competition in procurement. European Economic Review 46 7 (2002) 1273-1303
-
(2002)
European Economic Review
, vol.46
, Issue.7
, pp. 1273-1303
-
-
Celantani, M.1
Ganuza, J.J.2
-
19
-
-
84957661460
-
-
A. Chan, Y. Frankel, Y. Tsiounis, Easy come - easy go divisible cash, in: Proceedings of EUROCRYPT'98, LNCS, vol. 1403, 1998, pp. 561-575.
-
A. Chan, Y. Frankel, Y. Tsiounis, Easy come - easy go divisible cash, in: Proceedings of EUROCRYPT'98, LNCS, vol. 1403, 1998, pp. 561-575.
-
-
-
-
20
-
-
52049090646
-
-
X. Chen, K. Kim, B. Lee, Receipt-free electronic auction schemes using homomorphic encryption, in: ICISC, 2003.
-
X. Chen, K. Kim, B. Lee, Receipt-free electronic auction schemes using homomorphic encryption, in: ICISC, 2003.
-
-
-
-
22
-
-
52049102494
-
-
I. Damgård, M. Jurik, A generalisation, a simplification and some applications of Paillier's probabilistic public-key system, in: Proceedings of Public Key Cryptography 01, 2001.
-
I. Damgård, M. Jurik, A generalisation, a simplification and some applications of Paillier's probabilistic public-key system, in: Proceedings of Public Key Cryptography 01, 2001.
-
-
-
-
23
-
-
52049104741
-
-
Dimitri N., Piga G., and Spagnolo G. (Eds), Cambridge University Press
-
In: Dimitri N., Piga G., and Spagnolo G. (Eds). Handbook of Procurement - Theory and Practice for Managers (2006), Cambridge University Press
-
(2006)
Handbook of Procurement - Theory and Practice for Managers
-
-
-
24
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Information Theory IT-31 4 (1985) 469-472
-
(1985)
IEEE Trans. Information Theory IT-31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
27
-
-
52049102311
-
-
D. Giry, P. Bulens, Cryptographic key length recommendation. (accessed 13.04.08).
-
D. Giry, P. Bulens, Cryptographic key length recommendation. (accessed 13.04.08).
-
-
-
-
28
-
-
84935948750
-
Collusive bidder behavior at single-object second price and english auctions
-
Graham D.A., and Marshall R.C. Collusive bidder behavior at single-object second price and english auctions. Journal of Political Economy 95 6 (1987) 1217-1239
-
(1987)
Journal of Political Economy
, vol.95
, Issue.6
, pp. 1217-1239
-
-
Graham, D.A.1
Marshall, R.C.2
-
29
-
-
85094835061
-
-
M. Harkavy, J.D. Tygar, H. Kikuchi, Electronic auctions with private bids, in: Proceedings of the Third USENIX Workshop on Electronic Commerce, 1998, pp. 61-74.
-
M. Harkavy, J.D. Tygar, H. Kikuchi, Electronic auctions with private bids, in: Proceedings of the Third USENIX Workshop on Electronic Commerce, 1998, pp. 61-74.
-
-
-
-
30
-
-
52049093038
-
A test for collusion between a bidder and an auctioneer in sealed-bid auctions
-
Ingraham A.T. A test for collusion between a bidder and an auctioneer in sealed-bid auctions. Contributions to Economic Analysis and Policy 4 1 (2005) 1-32
-
(2005)
Contributions to Economic Analysis and Policy
, vol.4
, Issue.1
, pp. 1-32
-
-
Ingraham, A.T.1
-
32
-
-
52049098981
-
-
M.J. Jurik, Extensions to the paillier cryptosystem with applications to cryptological protocols, Ph.D. Thesis, University of Århus, 2003.
-
M.J. Jurik, Extensions to the paillier cryptosystem with applications to cryptological protocols, Ph.D. Thesis, University of Århus, 2003.
-
-
-
-
33
-
-
52049103417
-
-
H. Kikuchi, (m + 1)st price auction protocol, in: Proceedings of Financial Cryptography, 2001.
-
H. Kikuchi, (m + 1)st price auction protocol, in: Proceedings of Financial Cryptography, 2001.
-
-
-
-
34
-
-
52049126871
-
-
S.A. Koc, W.S. Neilson, Bribing the auctioneer in first-price sealed-bid auctions, Technical Report, Kocaeli University, 2006.
-
S.A. Koc, W.S. Neilson, Bribing the auctioneer in first-price sealed-bid auctions, Technical Report, Kocaeli University, 2006.
-
-
-
-
35
-
-
9544219688
-
Approximately-strategyproof and tractable multi-unit auctions
-
Kothari A., Parkes D.C., and Suri S. Approximately-strategyproof and tractable multi-unit auctions. Decision Support Systems 39 1 (2005) 105-121
-
(2005)
Decision Support Systems
, vol.39
, Issue.1
, pp. 105-121
-
-
Kothari, A.1
Parkes, D.C.2
Suri, S.3
-
37
-
-
17044390334
-
-
M. Kumar, S.I. Feldman, Internet auctions, in: Proceedings of Third USENIX Workshop on Electronic Commerce, 1998.
-
M. Kumar, S.I. Feldman, Internet auctions, in: Proceedings of Third USENIX Workshop on Electronic Commerce, 1998.
-
-
-
-
39
-
-
33748698027
-
-
S. Lahaie, An analysis of alternative slot auction designs for sponsored search, in: Proceedings of the Seventh ACM Conference on Electronic Commerce, 2006.
-
S. Lahaie, An analysis of alternative slot auction designs for sponsored search, in: Proceedings of the Seventh ACM Conference on Electronic Commerce, 2006.
-
-
-
-
40
-
-
52049109476
-
-
Y. Lengwiler, E. Wolfstetter, Bid rigging. an analysis of corruption in auctions, Technical Report, Humboldt-University at Berlin, 2005.
-
Y. Lengwiler, E. Wolfstetter, Bid rigging. an analysis of corruption in auctions, Technical Report, Humboldt-University at Berlin, 2005.
-
-
-
-
41
-
-
50249144147
-
Corruption in procurement auctions
-
Dimitri N., Piga G., and Spagnolo G. (Eds), Cambridge University Press (Chapter 16)
-
Lengwiler Y., and Wolfstetter E. Corruption in procurement auctions. In: Dimitri N., Piga G., and Spagnolo G. (Eds). Handbook of Procurement - Theory and Practice for Managers (2006), Cambridge University Press (Chapter 16)
-
(2006)
Handbook of Procurement - Theory and Practice for Managers
-
-
Lengwiler, Y.1
Wolfstetter, E.2
-
42
-
-
52049083972
-
LiDIA-a library for computational number theory
-
LiDIA-Group. LiDIA-a library for computational number theory. TU Darmstadt 31 3 (2001) 54-57
-
(2001)
TU Darmstadt
, vol.31
, Issue.3
, pp. 54-57
-
-
LiDIA-Group1
-
43
-
-
84957026937
-
-
H. Lipmaa, N. Asokan, V. Niemi, Secure Vickrey auctions without threshold trust, in: Proceedings of the Sixth International Conference on Financial Cryptography (FC 2002), 2002, pp. 87-101.
-
H. Lipmaa, N. Asokan, V. Niemi, Secure Vickrey auctions without threshold trust, in: Proceedings of the Sixth International Conference on Financial Cryptography (FC 2002), 2002, pp. 87-101.
-
-
-
-
46
-
-
84944878354
-
-
A.J. Menezes, P.C. van Oorschot, S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 2001, URL: .
-
A.J. Menezes, P.C. van Oorschot, S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 2001, URL: .
-
-
-
-
47
-
-
52049116985
-
-
F.M. Menezes, P.K. Monteiro, Corruption and Auctions, Technical Report, Getulio Vargas Foundation, Rio de Janeiro, Brazil, 2001.
-
F.M. Menezes, P.K. Monteiro, Corruption and Auctions, Technical Report, Getulio Vargas Foundation, Rio de Janeiro, Brazil, 2001.
-
-
-
-
51
-
-
52049087173
-
-
T. Nakanishi, D. Yamamoto, Y. Sugiyama, Sealed-bid auctions with efficient bids, (accessed 13.04.2008).
-
T. Nakanishi, D. Yamamoto, Y. Sugiyama, Sealed-bid auctions with efficient bids, (accessed 13.04.2008).
-
-
-
-
52
-
-
84883898504
-
-
M. Naor, B. Pinkas, R. Sumner, Privacy preserving auctions and mechanism design, in: Proceedings of the First ACM Conference on Electronic Commerce, 1999, pp. 129-139.
-
M. Naor, B. Pinkas, R. Sumner, Privacy preserving auctions and mechanism design, in: Proceedings of the First ACM Conference on Electronic Commerce, 1999, pp. 129-139.
-
-
-
-
53
-
-
33144460420
-
Bidding languages for combinatorial auctions
-
Cramton P., Shoham Y., and Steinberg R. (Eds), Cambridge University Press
-
Nisan N. Bidding languages for combinatorial auctions. In: Cramton P., Shoham Y., and Steinberg R. (Eds). Combinatorial Auctions (2006), Cambridge University Press
-
(2006)
Combinatorial Auctions
-
-
Nisan, N.1
-
54
-
-
52049086974
-
-
P. Paillier, Cryptographie à clé publique basée sur la r ésiduosité de degré composite, Ph.D. Thesis, École Nationale Supérieure des Tél écommunications, 1999.
-
P. Paillier, Cryptographie à clé publique basée sur la r ésiduosité de degré composite, Ph.D. Thesis, École Nationale Supérieure des Tél écommunications, 1999.
-
-
-
-
55
-
-
52049101204
-
-
P. Paillier, Public-key cryptosystems based on composite residuosity classes, in: Proceedings of EUROCRYPT'99, 1999, pp. 223-239.
-
P. Paillier, Public-key cryptosystems based on composite residuosity classes, in: Proceedings of EUROCRYPT'99, 1999, pp. 223-239.
-
-
-
-
56
-
-
0001751317
-
A study of collusion in first-price auctions
-
Pesendorfer M. A study of collusion in first-price auctions. The Review of Economic Studies 67 3 (2000) 381-411
-
(2000)
The Review of Economic Studies
, vol.67
, Issue.3
, pp. 381-411
-
-
Pesendorfer, M.1
-
57
-
-
0141590641
-
Combinatorial auction design
-
Porter D., Rassenti S., Roopnarine A., and Smith V. Combinatorial auction design. Proceedings of the National Academy of Sciences 100 19 (2003) 11153-11157
-
(2003)
Proceedings of the National Academy of Sciences
, vol.100
, Issue.19
, pp. 11153-11157
-
-
Porter, D.1
Rassenti, S.2
Roopnarine, A.3
Smith, V.4
-
58
-
-
85050842171
-
Detection of bid-rigging in procurement auctions
-
Porter R.H., and Zona D.J. Detection of bid-rigging in procurement auctions. Journal of Political Economy 3 (1993) 518-538
-
(1993)
Journal of Political Economy
, Issue.3
, pp. 518-538
-
-
Porter, R.H.1
Zona, D.J.2
-
59
-
-
0010277907
-
Digitalized signatures
-
Academic Press, New York
-
Rabin M.O. Digitalized signatures. Foundations of Secure Computing (1978), Academic Press, New York 155-166
-
(1978)
Foundations of Secure Computing
, pp. 155-166
-
-
Rabin, M.O.1
-
60
-
-
52049117927
-
-
M.O. Rabin, Digitalized signatures and public-key functions as intractable as factorization, Technical Report MIT/LCS/TR-212, MIT Laboratory for Computer Science, 1979.
-
M.O. Rabin, Digitalized signatures and public-key functions as intractable as factorization, Technical Report MIT/LCS/TR-212, MIT Laboratory for Computer Science, 1979.
-
-
-
-
61
-
-
82755188831
-
-
M.O. Rabin, R.A. Servedio, C. Thorpe, Highly efficient secrecy-preserving proofs of correctness of computations and applications, in: Proceedings of IEEE Symposium on Logic in Computer Science, 2007.
-
M.O. Rabin, R.A. Servedio, C. Thorpe, Highly efficient secrecy-preserving proofs of correctness of computations and applications, in: Proceedings of IEEE Symposium on Logic in Computer Science, 2007.
-
-
-
-
62
-
-
52049124606
-
-
M.O. Rabin, C. Thorpe, Time-lapse cryptography, Technical Report TR-22-06, Harvard University School of Engineering and Computer Science, 2006.
-
M.O. Rabin, C. Thorpe, Time-lapse cryptography, Technical Report TR-22-06, Harvard University School of Engineering and Computer Science, 2006.
-
-
-
-
63
-
-
52049093517
-
-
R.L. Rivest, A. Shamir, L.M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Technical Report MIT/LCS/TM-82, MIT Laboratory for Computer Science, 1977.
-
R.L. Rivest, A. Shamir, L.M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Technical Report MIT/LCS/TM-82, MIT Laboratory for Computer Science, 1977.
-
-
-
-
64
-
-
52049110128
-
-
R.L. Rivest, A. Shamir, D.A. Wagner, Time-lock puzzles and timed release crypto, Technical Report MIT/LCS/TR-684, MIT, 1996.
-
R.L. Rivest, A. Shamir, D.A. Wagner, Time-lock puzzles and timed release crypto, Technical Report MIT/LCS/TR-684, MIT, 1996.
-
-
-
-
65
-
-
0003247405
-
Collusion and the choice of auction
-
Robinson M.S. Collusion and the choice of auction. Rand J. Econ. 16 1 (1985) 141-145
-
(1985)
Rand J. Econ.
, vol.16
, Issue.1
, pp. 141-145
-
-
Robinson, M.S.1
-
68
-
-
84927061848
-
Preventing collusion between firms in auctions
-
Janssen M.C.W. (Ed), Cambridge University Press (Chapter 3)
-
Salmon T.C. Preventing collusion between firms in auctions. In: Janssen M.C.W. (Ed). Auctioning Public Assets: Analysis and Alternatives (2004), Cambridge University Press (Chapter 3)
-
(2004)
Auctioning Public Assets: Analysis and Alternatives
-
-
Salmon, T.C.1
-
69
-
-
33750696788
-
Changing the game in strategic sourcing at Procter & Gamble: expressive competition enabled by optimization
-
Sandholm T., Levine D., Concordia M., Martyn P., Hughes R., Jacobes J., and Begg D. Changing the game in strategic sourcing at Procter & Gamble: expressive competition enabled by optimization. Interfaces 36 1 (2006) 55-68
-
(2006)
Interfaces
, vol.36
, Issue.1
, pp. 55-68
-
-
Sandholm, T.1
Levine, D.2
Concordia, M.3
Martyn, P.4
Hughes, R.5
Jacobes, J.6
Begg, D.7
-
70
-
-
85159753453
-
-
T. Sandholm, S. Suri, A. Gilpin, D. Levine, Winner determination in combinatorial auction generalizations, in: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2002.
-
T. Sandholm, S. Suri, A. Gilpin, D. Levine, Winner determination in combinatorial auction generalizations, in: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2002.
-
-
-
-
73
-
-
52049111919
-
-
S.G. Stubblebine, P.F. Syverson, Fair on-line auctions without special trusted parties, in: Proceedings of Financial Cryptography, 1999.
-
S.G. Stubblebine, P.F. Syverson, Fair on-line auctions without special trusted parties, in: Proceedings of Financial Cryptography, 1999.
-
-
-
-
74
-
-
52049084872
-
-
K. Suzuki, M. Yokoo, Secure generalized Vickrey auction using homomorphic encryption, in: Proceedings Financial Cryptography, 2003.
-
K. Suzuki, M. Yokoo, Secure generalized Vickrey auction using homomorphic encryption, in: Proceedings Financial Cryptography, 2003.
-
-
-
-
76
-
-
38549171759
-
Cryptographic securities exchanges
-
Proceedings of Financial Cryptography and Data Security, Springer, Berlin/Heidelberg
-
Thorpe C., and Parkes D.C. Cryptographic securities exchanges. Proceedings of Financial Cryptography and Data Security. Lecture Notes in Computer Science vol. 4886 (2007), Springer, Berlin/Heidelberg 163-178
-
(2007)
Lecture Notes in Computer Science
, vol.4886
, pp. 163-178
-
-
Thorpe, C.1
Parkes, D.C.2
-
78
-
-
52049099448
-
-
US Central Intelligence Agency, The World Factbook: European Union, (accessed 13.04.2008).
-
US Central Intelligence Agency, The World Factbook: European Union, (accessed 13.04.2008).
-
-
-
-
79
-
-
84980096808
-
Counterspeculation, auctions, and competitive sealed tenders
-
Vickrey W. Counterspeculation, auctions, and competitive sealed tenders. Journal of Finance 16 1 (1961) 8-37
-
(1961)
Journal of Finance
, vol.16
, Issue.1
, pp. 8-37
-
-
Vickrey, W.1
-
80
-
-
85159747054
-
-
M. Yokoo, K. Suzuki, Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions, in: Proceedings of the First International Conference on Autonomous Agents and Multiagent Systems, 2002.
-
M. Yokoo, K. Suzuki, Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions, in: Proceedings of the First International Conference on Autonomous Agents and Multiagent Systems, 2002.
-
-
-
|