Privacy-preserving combinatorial auction without an auctioneer
暂无分享,去创建一个
Wei Li | R. Bie | Arwa Alrawais | Ruinian Li | Bo Mei | Chun-qiang Hu
[1] Jiguo Yu,et al. A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds , 2018, IEEE Transactions on Big Data.
[2] Jiguo Yu,et al. SecureGuard: A Certificate Validation System in Public Key Infrastructure , 2018, IEEE Transactions on Vehicular Technology.
[3] Jiguo Yu,et al. Mutual Privacy Preserving $k$ -Means Clustering in Social Participatory Sensing , 2017, IEEE Transactions on Industrial Informatics.
[4] Chunqiang Hu,et al. Secure multi-unit sealed first-price auction mechanisms , 2016, Secur. Commun. Networks.
[5] Chunqiang Hu,et al. A Bidder-Oriented Privacy-Preserving VCG Auction Scheme , 2015, WASA.
[6] Chunqiang Hu,et al. A Secure Multi-unit Sealed First-Price Auction Mechanism , 2015, WASA.
[7] Chunqiang Hu,et al. Secure Auctions without an Auctioneer via Verifiable Secret Sharing , 2015, PAMCO@MobiHoc.
[8] Jing Liu,et al. Achieving Accountability in Smart Grid , 2014, IEEE Systems Journal.
[9] Douglas R. Stinson,et al. Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing , 2014, ISPEC.
[10] Xiaofeng Liao,et al. Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme , 2013, IEEE Journal on Selected Areas in Communications.
[11] Fan Wu,et al. SPRING: A Strategy-proof and Privacy preserving spectrum auction mechanism , 2013, 2013 Proceedings IEEE INFOCOM.
[12] Xiaofeng Liao,et al. Verifiable multi-secret sharing based on LFSR sequences , 2012, Theor. Comput. Sci..
[13] Xiaofeng Liao,et al. Secret Image Sharing Based on Chaotic Map and Chinese Remainder Theorem , 2012, Int. J. Wavelets Multiresolution Inf. Process..
[14] M. Pan,et al. Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer , 2012, Wirel. Networks.
[15] Joan Feigenbaum,et al. Towards a formal model of accountability , 2011, NSPW '11.
[16] Miao Pan,et al. Purging the Back-Room Dealing: Secure Spectrum Auction Leveraging Paillier Cryptosystem , 2011, IEEE Journal on Selected Areas in Communications.
[17] Ralf Küsters,et al. Accountability: definition and relationship to verifiability , 2010, CCS '10.
[18] G. A. Sutherland,et al. A System of Diet and Dietetics , 2010 .
[19] Radha Jagadeesan,et al. Towards a Theory of Accountability and Audit , 2009, ESORICS.
[20] Massoud Hadian Dehkordi,et al. An efficient threshold verifiable multi-secret sharing , 2008, Comput. Stand. Interfaces.
[21] Makoto Yokoo,et al. Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing , 2002, Financial Cryptography.
[22] Hiroaki Kikuchi,et al. (M+1)st-Price Auction Protocol , 2002, Financial Cryptography.
[23] Kunio Kobayashi,et al. Efficient Sealed-Bid Auction Using Hash Chain , 2000, ICISC.
[24] Christian Cachin,et al. Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.
[25] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[26] Biswanath Mukherjee,et al. Analysis of an algorithm for distributed recognition and accountability , 1993, CCS '93.
[27] Adi Shamir,et al. How to share a secret , 1979, CACM.
[28] R Bellman,et al. DYNAMIC PROGRAMMING AND LAGRANGE MULTIPLIERS. , 1956, Proceedings of the National Academy of Sciences of the United States of America.
[29] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[30] Koutarou Suzuki,et al. Efficient Sealed-Bid Auction by Using One-Way Functions , 2001 .