메뉴 건너뛰기




Volumn 2182, Issue , 2001, Pages 154-165

Cryptographic protocols for secure second-price auctions

Author keywords

[No Author keywords available]

Indexed keywords

BINS; COSTS; CRYPTOGRAPHY; MULTI AGENT SYSTEMS;

EID: 84937394850     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/3-540-44799-7_16     Document Type: Conference Paper
Times cited : (11)

References (25)
  • 2
    • 23044517609 scopus 로고    scopus 로고
    • Task assignment in multiagent systems based on vickreytype auctioning and leveled commitment contracting
    • In M. Klusch and L. Kerschberg, editors, of Lecture Notes in Artificial Intelligence, Berlin et al.,. Springer-Verlag
    • F. Brandt,W. Brauer, and G.Weiß. Task assignment in multiagent systems based on Vickreytype auctioning and leveled commitment contracting. In M. Klusch and L. Kerschberg, editors, Cooperative Information Agents IV, volume 1860 of Lecture Notes in Artificial Intelligence, pages 95-106, Berlin et al., 2000. Springer-Verlag.
    • (2000) Cooperative Information Agents IV , vol.1860 , pp. 95-106
    • Brandt, F.1    Weiß, G.2
  • 4
    • 27944502019 scopus 로고
    • User control modes and IPfJatlite: A Java agent infrastructure with message routing allocation
    • presented at
    • K. Danielsen and M. Weiss. User control modes and IP allocation. http://www.press.umich.edu/jep/works/DanieContr.html, 1995. presented at MIT Workshop on Internet Economics.
    • (1995) MIT Workshop on Internet Economics
    • Danielsen, K.1    Weiss, M.2
  • 5
    • 0003305868 scopus 로고
    • Incentive engineering for computational resource management
    • In B.A. Huberman, editor,. The Netherlands
    • K.E. Drexler and M.S. Miller. Incentive engineering for computational resource management. In B.A. Huberman, editor, The Ecology of Computation. The Netherlands, 1988.
    • (1988) The Ecology of Computation
    • Drexler, K.E.1    Miller, M.S.2
  • 7
    • 0001710760 scopus 로고    scopus 로고
    • The design and implementation of a secure auction service
    • M.K. Franklin and M.K. Reiter. The design and implementation of a secure auction service. IEEE Trans. on Software Engineering, 22(5):302-312, 1996.
    • (1996) IEEE Trans. on Software Engineering , vol.22 , Issue.5 , pp. 302-312
    • Franklin, M.K.1    Reiter, M.K.2
  • 10
    • 84937417083 scopus 로고    scopus 로고
    • Mix and match: Secure function evaluation via ciphertexts
    • M. Jakobsson and A. Juels. Mix and match: Secure function evaluation via ciphertexts. In Proceedings of Asiacrypt-00, pages 162-177, 2000.
    • (2000) Proceedings of Asiacrypt-00 , pp. 162-177
    • Jakobsson, M.1    Juels, A.2
  • 13
    • 0031679773 scopus 로고    scopus 로고
    • Secure electronic sealed-bid auction protocol with public key cryptography
    • E81-A
    • M. Kudo. Secure electronic sealed-bid auction protocol with public key cryptography. IEICE Trans. Fundamentals, E81-A(1), 1998.
    • (1998) IEICE Trans. Fundamentals , Issue.1
    • Kudo, M.1
  • 15
    • 0001757115 scopus 로고
    • A theory of auctions and competitive bidding
    • P.R. Milgrom and R.J. Weber. A Theory of Auctions and Competitive Bidding. Econometrica, 50:1089-1122, 1982.
    • (1982) Econometrica , vol.50 , pp. 1089-1122
    • Milgrom, P.R.1    Weber, R.J.2
  • 17
    • 21844516729 scopus 로고
    • Two models of bid-taker cheating in vickrey auctions
    • M.H. Rothkopf and R.M. Harstad. Two models of bid-taker cheating in Vickrey auctions. Journal of Business, 68(2):257-267, 1995.
    • (1995) Journal of Business , vol.68 , Issue.2 , pp. 257-267
    • Rothkopf, M.H.1    Harstad, R.M.2
  • 22
    • 84980096808 scopus 로고
    • Counter speculation, auctions, and competitive sealed tenders
    • W. Vickrey. Counter speculation, auctions, and competitive sealed tenders. Journal of Finance, 16(1):8-37, 1961.
    • (1961) Journal of Finance , vol.16 , Issue.1 , pp. 8-37
    • Vickrey, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.