Contextually Private Mechanisms
暂无分享,去创建一个
[1] Andrew Mackenzie,et al. Menu Mechanisms , 2020, J. Econ. Theory.
[2] Non-Bossiness and First-Price Auctions , 2021, SSRN Electronic Journal.
[3] Shengwu Li,et al. On the Computational Properties of Obviously Strategy-Proof Mechanisms , 2021, ArXiv.
[4] Peter Troyan,et al. A Theory of Simplicity in Games and Mechanism Design , 2019, SSRN Electronic Journal.
[5] K. Eliaz,et al. Bayesian privacy , 2021, Theoretical Economics.
[6] Sophie Bade,et al. Random Serial Dictatorship: The One and Only , 2020, Math. Oper. Res..
[7] Ilya Segal,et al. Clock Auctions and Radio Spectrum Reallocation , 2020, Journal of Political Economy.
[8] Mohammad Akbarpour,et al. Credible Auctions: A Trilemma , 2019, Econometrica.
[9] Andrew Mackenzie,et al. A revelation principle for obviously strategy-proof implementation , 2018, Games Econ. Behav..
[10] Jacob D. Leshno,et al. The Cutoff Structure of Top Trading Cycles in School Choice , 2017, The Review of Economic Studies.
[11] Mehrdad Nojoumian,et al. Comprehensive survey on privacy-preserving protocols for sealed-bid auctions , 2020, Comput. Secur..
[12] Evangelos P. Markatos,et al. No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem , 2019, Internet Measurement Conference.
[13] De Liu. Preserving Bidder Privacy in Assignment Auctions: Design and Measurement , 2019 .
[14] Itai Ashlagi,et al. Stable matching mechanisms are not obviously strategy-proof , 2015, J. Econ. Theory.
[15] Helen Nissenbaum,et al. Contextual Integrity through the Lens of Computer Science , 2017, Found. Trends Priv. Secur..
[16] Shengwu Li. Obviously Strategy-Proof Mechanisms , 2017 .
[17] Sophie Bade,et al. Gibbard-Satterthwaite Success Stories and Obvious Strategyproofness , 2016, EC.
[18] William Thomson. Non-bossiness , 2016, Soc. Choice Welf..
[19] Eduardo M. Azevedo,et al. A Supply and Demand Framework for Two-Sided Matching Markets , 2014, Journal of Political Economy.
[20] Aaron Roth,et al. Privacy and mechanism design , 2013, SECO.
[21] L. S. Shapley,et al. College Admissions and the Stability of Marriage , 2013, Am. Math. Mon..
[22] David Xiao,et al. Is privacy compatible with truthfulness? , 2013, ITCS '13.
[23] Aaron Roth,et al. Conducting truthful surveys, cheaply , 2012, EC '12.
[24] Aaron Roth,et al. Take It or Leave It: Running a Survey When Privacy Comes at a Cost , 2012, WINE.
[25] Kobbi Nissim,et al. Privacy-aware mechanism design , 2011, EC '12.
[26] Aaron Roth,et al. Selling privacy at auction , 2010, EC '11.
[27] Ivan Damgård,et al. Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.
[28] John William Hatfield,et al. Strategy-proof, efficient, and nonbossy quota allocations , 2009, Soc. Choice Welf..
[29] D. MacKenzie,et al. The use of knowledge about society , 2008 .
[30] Felix Brandt,et al. On the Existence of Unconditionally Privacy-Preserving Auction Protocols , 2008, TSEC.
[31] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[32] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[33] Noam Nisan,et al. The communication requirements of efficient allocations and supporting prices , 2006, J. Econ. Theory.
[34] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[35] Felix Brandt,et al. Unconditional privacy in social choice , 2005, TARK.
[36] Lawrence M. Ausubel. An Efficient Ascending-Bid Auction for Multiple Objects , 2004 .
[37] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[38] Eyal Kushilevitz,et al. On the structure of the privacy hierarchy , 2004, Journal of Cryptology.
[39] M. Utku Ünver,et al. Course Bidding at Business Schools , 2007 .
[40] Richard P. McLean,et al. Informational Size and Incentive Compatibility , 2001 .
[41] M. Balinski,et al. A Tale of Two Mechanisms: Student Placement , 1999 .
[42] Matthew K. Franklin,et al. The design and implementation of a secure auction service , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[43] H. Nurmi,et al. Cryptographic protocols for Vickrey auctions , 1993 .
[44] Faruk Gul,et al. Asymptotic efficiency in large exchange economies with asymmetric information , 1992 .
[45] M. Rothkopf,et al. Why Are Vickrey Auctions Rare? , 1990, Journal of Political Economy.
[46] Eyal Kushilevitz,et al. A zero-one law for Boolean privacy , 1989, STOC '89.
[47] M. Satterthwaite,et al. Strategy-Proof Allocation Mechanisms at Differentiable Points , 1981 .
[48] L. Shapley,et al. On cores and indivisibility , 1974 .
[49] L. Hurwicz. The Design of Mechanisms for Resource Allocation , 1973 .
[50] William Vickrey,et al. Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .