-
1
-
-
0041863131
-
M+1-st price auction using homomorphic encryption
-
M. Abe, and K. Suzuki, M+1-st price auction using homomorphic encryption, Public Key Cryptography, vol. 72, pp. 115-124, 2002.
-
(2002)
Public Key Cryptography
, vol.72
, pp. 115-124
-
-
Abe, M.1
Suzuki, K.2
-
2
-
-
33749009024
-
How to obtain full privacy in auctions
-
F. Brandt, How to obtain full privacy in auctions, International Journal of Information Security, vol. 5, no. 4, pp. 201-216, 2005.
-
(2005)
International Journal of Information Security
, vol.5
, Issue.4
, pp. 201-216
-
-
Brandt, F.1
-
3
-
-
26444526224
-
Effcient privacy-preserving protocols for multiunit auctions
-
Roseau, Springer-Verlag
-
F. Brandt, and T. Sandholm, Effcient privacy-preserving protocols for multiunit auctions, Financial Cryptography and Data Security: 9th International Conference (FC 2005), pp. 298-312, Roseau, Springer-Verlag, 2005.
-
(2005)
Financial Cryptography and Data Security: 9th International Conference (FC 2005)
, pp. 298-312
-
-
Brandt, F.1
Sandholm, T.2
-
5
-
-
0001710760
-
The design and implementation of a secure auction service
-
M. K. Franklin, M. K. Reiter, and E. Jernigan, The design and implementation of a secure auction service, IEEE Transactions on Software Engineering, vol. 22, no. 5, pp. 302-312, 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.5
, pp. 302-312
-
-
Franklin, M.K.1
Reiter, M.K.2
Jernigan, E.3
-
6
-
-
26444553369
-
Sealed-bid auction protocol
-
A Two-Server
-
A. Juels, M. Szydlo, and A Two-Server, Sealed-bid auction protocol, Financial Cryptography, pp. 72-86, 2002.
-
(2002)
Financial Cryptography
, pp. 72-86
-
-
Juels, A.1
Szydlo, M.2
-
7
-
-
0002400630
-
Multiround Anonymous Auction Protocols
-
H. Kikuchi, M. Harkavy, and D. TYGAR, Multi-round Anonymous Auction Protocols, Special Issue on Internet Technology and Its Applications, pp. 62-69, 1998.
-
(1998)
Special Issue on Internet Technology and Its Applications
, pp. 62-69
-
-
Kikuchi, H.1
Harkavy, M.2
Tygar, D.3
-
8
-
-
84957026937
-
Secure vickrey auctions without threshold trust
-
H. Lipmaa, N. Asokan, and V. Niemi, Secure vickrey auctions without threshold trust, Financial Cryptography, pp. 87-101, 2002.
-
(2002)
Financial Cryptography
, pp. 87-101
-
-
Lipmaa, H.1
Asokan, N.2
Niemi, V.3
-
10
-
-
84946833891
-
How to leak a secret
-
R. L. Rivest, A. Shamir, and Y. Tauman, How to leak a secret, Asiacrypt '01, pp. 552-565, 2001.
-
(2001)
Asiacrypt '01
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
11
-
-
33644663036
-
Distributed ascending proxy auction: A cryptographic approach
-
D. Rolli, M. Conrad, D. Neumann, and C. Sorge, Distributed ascending proxy auction: A cryptographic approach, Wirtschaftsinformatik, vol. 48, no. 1, pp. 7-15, 2006.
-
(2006)
Wirtschaftsinformatik
, vol.48
, Issue.1
, pp. 7-15
-
-
Rolli, D.1
Conrad, M.2
Neumann, D.3
Sorge, C.4
-
12
-
-
35248870807
-
An auction protocol which hides bids of losers
-
K. Sako, An auction protocol which hides bids of losers, Public Key Cryptography, pp. 422-432, 2000.
-
(2000)
Public Key Cryptography
, pp. 422-432
-
-
Sako, K.1
-
14
-
-
27944480122
-
A secure reverse vickrey auction scheme with bid privacy
-
D. Shih, H. Huang, D. C. Yen, A secure reverse vickrey auction scheme with bid privacy, Informaction Sciences, vol. 176, no. 5, pp. 550-564, 2006.
-
(2006)
Informaction Sciences
, vol.176
, Issue.5
, pp. 550-564
-
-
Shih, D.1
Huang, H.2
Yen, D.C.3
-
15
-
-
46649086126
-
A secure protocol of reverse discriminatory auction with bid privacy
-
D. Shih, C. Cheng, and J. Shen, A secure protocol of reverse discriminatory auction with bid privacy, ICMB, pp. 52, 2007.
-
(2007)
ICMB
, vol.52
-
-
Shih, D.1
Cheng, C.2
Shen, J.3
-
16
-
-
84959060612
-
Effcient sealed-bid auction using hash chain
-
K. Suzuki, K. Kobayashi, and Hikaru Morita, Effcient sealed-bid auction using hash chain, ICISC, pp. 183-191, 2000.
-
(2000)
ICISC
, pp. 183-191
-
-
Suzuki, K.1
Kobayashi, K.2
Morita, H.3
-
17
-
-
35248879821
-
Secure generalized Vickrey auction using homomorphic encryption
-
Springer-Verlag, LNCS 2742
-
K. Suzuki, and M. Yokoo, Secure generalized Vickrey auction using homomorphic encryption, Proceedings of 7th FC Conference, LNCS 2742, pp. 239-249, Springer-Verlag, 2003.
-
(2003)
Proceedings of 7th FC Conference
, pp. 239-249
-
-
Suzuki, K.1
Yokoo, M.2
-
18
-
-
0026820775
-
Spawn: A distributed computational economy
-
C. A. Waldspurger, T. Hogg, B. A. Huberman, J. O. Kephart, and W. S. Stornetta, Spawn: A distributed computational economy, IEEE Transactions on Software Engineering, vol. 18, no. 2, pp. 103-117, 1992.
-
(1992)
IEEE Transactions on Software Engineering
, vol.18
, Issue.2
, pp. 103-117
-
-
Waldspurger, C.A.1
Hogg, T.2
Huberman, B.A.3
Kephart, J.O.4
Stornetta, W.S.5
|