Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing
暂无分享,去创建一个
[1] Sean R Eddy,et al. What is dynamic programming? , 2004, Nature Biotechnology.
[2] Yoav Shoham,et al. Towards a universal test suite for combinatorial auction algorithms , 2000, EC '00.
[3] J. Doug Tygar,et al. Electronic Auctions with Private Bids , 1998, USENIX Workshop on Electronic Commerce.
[4] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[5] Hiroaki Kikuchi,et al. (M+1)st-Price Auction Protocol , 2002, Financial Cryptography.
[6] Paul F. Syverson,et al. Fair On-Line Auctions without Special Trusted Parties , 1999, Financial Cryptography.
[7] Michael P. Wellman,et al. The Michigan Internet AuctionBot: a configurable auction server for human and software agents , 1998, AGENTS '98.
[8] Kouichi Sakurai,et al. A bulletin-board based digital auction scheme with bidding down strategy-towards anonymous electroni , 1999 .
[9] David Levine,et al. CABOB: A Fast Optimal Algorithm for Combinatorial Auctions , 2001, IJCAI.
[10] 松井 知己,et al. Sealed Bid Multi-object Auctions with Necessary Bundles and its Application to Spectrum Auctions , 2001 .
[11] Moshe Tennenholtz,et al. Optimal auctions revisited , 1998, Artif. Intell..
[12] Adi Shamir,et al. How to share a secret , 1979, CACM.
[13] Kazue Sako,et al. An Auction Protocol Which Hides Bids of Losers , 2000, Public Key Cryptography.
[14] Makoto Yokoo,et al. Robust Combinatorial Auction Protocol against False-Name Bids , 2000, AAAI/IAAI.
[15] Tuomas Sandholm,et al. An algorithm for optimal winner determination in combinatorial auctions , 1999, IJCAI 1999.
[16] Yoav Shoham,et al. Truth revelation in approximately efficient combinatorial auctions , 2002, EC '99.
[17] Moni Naor,et al. Privacy preserving auctions and mechanism design , 1999, EC '99.
[18] Rudolf Müller,et al. Optimization in electronic markets: examples in combinatorial auctions , 2001 .
[19] Masayuki Abe,et al. M+1-st Price Auction Using Homomorphic Encryption , 2002, Public Key Cryptography.
[20] Takahiro Watanabe,et al. Sealed Bid Mulit-object Auctions with Necessary Bundles and Its Application to Spectrum Auctions , 2001, PRIMA.
[21] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[22] Matthew K. Franklin,et al. The Design and Implementation of a Secure Auction Service , 1996, IEEE Trans. Software Eng..
[23] P. Klemperer. Auction Theory: A Guide to the Literature , 1999 .
[24] Yoav Shoham,et al. Taming the Computational Complexity of Combinatorial Auctions: Optimal and Approximate Approaches , 1999, IJCAI.
[25] Koji Chida,et al. Efficient Sealed-Bid Auctions for Massive Numbers of Bidders with Lump Comparison , 2001, ISC.
[26] Ronald M. Harstad,et al. Computationally Manageable Combinational Auctions , 1998 .
[27] E. Rasmussen. Games and Information , 1989 .
[28] Hiroaki Kikuchi,et al. Multi-round Anonymous Auction Protocols , 1999 .
[29] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[30] Makoto Yokoo,et al. Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions , 2002, AAMAS '02.
[31] Makoto Yokoo,et al. An efficient approximate algorithm for winner determination in combinatorial auctions , 2000, EC '00.
[32] Moshe Tennenholtz. Some Tractable Combinatorial Auctions , 2000, AAAI/IAAI.
[33] Jacques Stern,et al. Non-interactive Private Auctions , 2002, Financial Cryptography.
[34] M. D. Wilkinson,et al. Management science , 1989, British Dental Journal.
[35] Christian Cachin,et al. Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.
[36] Kunio Kobayashi,et al. Efficient Sealed-Bid Auction Using Hash Chain , 2000, ICISC.
[37] Hal R. Varian,et al. Economic Mechanism Design for Computerized Agents , 1995, USENIX Workshop on Electronic Commerce.
[38] Atsuko Miyaji,et al. An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees , 2000, ISW.