暂无分享,去创建一个
Xiang-Yang Li | He Huang | Lan Zhang | Taeho Jung | Xiangyang Li | Taeho Jung | Lan Zhang | He Huang
[1] Noam Nisan,et al. Approximation algorithms for combinatorial auctions with complement-free bidders , 2005, STOC '05.
[2] Silvio Micali,et al. Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.
[3] Bo Li,et al. TAHES: Truthful double Auction for Heterogeneous Spectrums , 2012, 2012 Proceedings IEEE INFOCOM.
[4] Eyal Kushilevitz. Privacy and Communication Complexity , 1992, SIAM J. Discret. Math..
[5] Jan Camenisch,et al. Blind Signatures Based on the Discrete Logarithm Problem , 1994, EUROCRYPT.
[6] Hung-Yu Wei,et al. Dynamic Auction Mechanism for Cloud Resource Allocation , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.
[7] Christian Cachin,et al. Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.
[8] S. Rassenti,et al. A Combinatorial Auction Mechanism for Airport Time Slot Allocation , 1982 .
[9] Makoto Yokoo,et al. Secure Generalized Vickrey Auction without Third-party Servers , 2004, Financial Cryptography.
[10] Ronald M. Harstad,et al. Computationally Manageable Combinational Auctions , 1998 .
[11] Jeffrey K. MacKie-Mason,et al. Generalized Vickrey Auctions , 1994 .
[12] David Levine,et al. CABOB: A Fast Optimal Algorithm for Combinatorial Auctions , 2001, IJCAI.
[13] Hal R. Varian,et al. Economic Mechanism Design for Computerized Agents , 1995, USENIX Workshop on Electronic Commerce.
[14] Eyal Kushilevitz,et al. A zero-one law for Boolean privacy , 1989, STOC '89.
[15] Felix Brandt,et al. On the Existence of Unconditionally Privacy-Preserving Auction Protocols , 2008, TSEC.
[16] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[17] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[18] Roger B. Myerson,et al. Optimal Auction Design , 1981, Math. Oper. Res..
[19] Xinbing Wang,et al. Spectrum Sharing in Cognitive Radio Networks—An Auction-Based Approach , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[20] Rainer A. Rueppel,et al. A new signature scheme based on the DSA giving message recovery , 1993, CCS '93.
[21] Miao Pan,et al. Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer , 2012, Wirel. Networks.
[22] Tuomas Sandholm,et al. Algorithm for optimal winner determination in combinatorial auctions , 2002, Artif. Intell..
[23] Xiang-Yang Li,et al. Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets , 2013, ArXiv.
[24] Shaojie Tang,et al. Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation , 2013, 2013 Proceedings IEEE INFOCOM.
[25] Ian Welch,et al. Development and Evaluation of a Secure, Privacy Preserving Combinatorial Auction , 2011, AISC.
[26] Manoj Kumar Tiwari,et al. Auction-based approach to resolve the scheduling problem in the steel making process , 2006 .
[27] Taeho Jung,et al. Search me if you can: Privacy-preserving location query service , 2012, 2013 Proceedings IEEE INFOCOM.
[28] Takayuki Ito,et al. Task Allocation in the RoboCup Rescue Simulation Domain: A Short Note , 2001, RoboCup.
[29] Sven de Vries,et al. Combinatorial Auctions: A Survey , 2003, INFORMS J. Comput..
[30] Miao Pan,et al. Economic-robust transmission opportunity auction in multi-hop wireless networks , 2013, 2013 Proceedings IEEE INFOCOM.
[31] Nicole Immorlica,et al. Dynamics of bid optimization in online advertisement auctions , 2007, WWW '07.
[32] Felix Brandt,et al. Efficient Privacy-Preserving Protocols for Multi-unit Auctions , 2005, Financial Cryptography.
[33] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[34] Yoav Shoham,et al. Combinatorial Auctions , 2005, Encyclopedia of Wireless Networks.
[35] Paul F. Syverson,et al. Fair On-Line Auctions without Special Trusted Parties , 1999, Financial Cryptography.
[36] K. K. Ramakrishnan,et al. iDEAL: Incentivized Dynamic Cellular Offloading via Auctions , 2013, IEEE/ACM Transactions on Networking.
[37] Yunhao Liu,et al. Verifiable private multi-party computation: Ranging and ranking , 2013, 2013 Proceedings IEEE INFOCOM.
[38] Xiang-Yang Li,et al. Privacy preserving cloud data access with multi-authorities , 2012, 2013 Proceedings IEEE INFOCOM.
[39] Fan Wu,et al. SPRING: A Strategy-proof and Privacy preserving spectrum auction mechanism , 2013, 2013 Proceedings IEEE INFOCOM.
[40] Silvio Micali,et al. Robustly Leveraging Collusion in Combinatorial Auctions , 2010, ICS.
[41] Makoto Yokoo,et al. Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing , 2002, Financial Cryptography.
[42] Makoto Yokoo,et al. Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions , 2002, AAMAS '02.
[43] Marceau Coupechoux,et al. An Auction Framework for Spectrum Allocation with Interference Constraint in Cognitive Radio Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[44] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[45] Moni Naor,et al. Privacy preserving auctions and mechanism design , 1999, EC '99.
[46] Noam Nisan,et al. Truthful approximation mechanisms for restricted combinatorial auctions , 2008, Games Econ. Behav..
[47] Kunio Kobayashi,et al. Efficient Sealed-Bid Auction Using Hash Chain , 2000, ICISC.