Cryptographic Protocols for Secure Second-Price Auctions
暂无分享,去创建一个
[1] Gerhard Weiss,et al. Multiagent systems: a modern approach to distributed artificial intelligence , 1999 .
[2] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[3] Matthew K. Franklin,et al. The design and implementation of a secure auction service , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[4] Wilfried Brauer,et al. Task Assignment in Multiagent Systems Based on Vickrey-Type Auctioning and Leveled Commitment Contracting , 2000, CIA.
[5] Jacques Stern,et al. Non-interactive Private Auctions , 2002, Financial Cryptography.
[6] Nicholas R. Jennings,et al. Foundations of distributed artificial intelligence , 1996, Sixth-generation computer technology series.
[7] W. K. Vickery,et al. Counter-Speculation Auctions and Competitive Sealed Tenders , 1961 .
[8] William Vickrey,et al. Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .
[9] Ketil Danielsen,et al. User Control Modes and IP Allocation , 1995 .
[10] Michael H. Rothkopf,et al. Two Models of Bid-Taker Cheating in Vickrey Auctions , 1995 .
[11] Markus Jakobsson,et al. Mix and Match: Secure Function Evaluation via Ciphertexts , 2000, ASIACRYPT.
[12] Scott H. Clearwater,et al. A Multi-Agent System for Controlling Building Environments , 1995, ICMAS.
[13] Michiharu Kudo,et al. Secure Electronic Sealed-Bid Auction Protocol with Public Key Cryptography (Special Section on Cryptography and Information Security) , 1998 .
[14] Gerhard Weiß,et al. Vicious strategies for Vickrey auctions , 2001, AGENTS '01.
[15] Adi Shamir,et al. How to share a secret , 1979, CACM.
[16] Paul R. Milgrom,et al. A theory of auctions and competitive bidding , 1982 .
[17] Julie A. Adams,et al. Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence , 2001, AI Mag..
[18] T. Sandholm. Limitations of the Vickrey Auction in Computational Multiagent Systems , 1996 .
[19] E. Drexler,et al. Incentive engineering for computational resource management , 1988 .
[20] Dawn Xiaodong Song,et al. Secure Auctions in a Publish/Subscribe System , 2000 .
[21] J. Doug Tygar,et al. Electronic Auctions with Private Bids , 1998, USENIX Workshop on Electronic Commerce.
[22] Shohachiro Nakanishi,et al. Distributed auction servers resolving winner and winning bid without revealing privacy of bids , 2000, Proceedings Seventh International Conference on Parallel and Distributed Systems: Workshops.
[23] Tad Hogg,et al. Spawn: A Distributed Computational Economy , 1992, IEEE Trans. Software Eng..
[24] Hiroaki Kikuchi,et al. (M+1)st-Price Auction Protocol , 2002, Financial Cryptography.
[25] Jacques Ferber,et al. Multi-agent systems - an introduction to distributed artificial intelligence , 1999 .
[26] R. McAfee,et al. Auctions and Bidding , 1986 .
[27] M. Rothkopf,et al. Why Are Vickrey Auctions Rare? , 1990, Journal of Political Economy.
[28] Gerhard Weiss,et al. Multiagent Systems , 1999 .