Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer
暂无分享,去创建一个
[1] Miao Pan,et al. Purging the Back-Room Dealing: Secure Spectrum Auction Leveraging Paillier Cryptosystem , 2011, IEEE Journal on Selected Areas in Communications.
[2] Miao Pan,et al. Reward and Risk for Opportunistic Spectrum Accessing in Cognitive Radio Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[3] Xia Zhou,et al. Breaking bidder collusion in large-scale spectrum auctions , 2010, MobiHoc '10.
[4] Miao Pan,et al. Fair Profit Allocation in the Spectrum Auction Using the Shapley Value , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[5] M. Chatterjee,et al. An Economic Framework for Dynamic Spectrum Access and Service Pricing , 2009, IEEE/ACM Transactions on Networking.
[6] Mingyan Liu,et al. Revenue generation for truthful spectrum auction in dynamic spectrum access , 2009, MobiHoc '09.
[7] Qian Zhang,et al. Stackelberg game for utility-based cooperative cognitiveradio networks , 2009, MobiHoc '09.
[8] Xia Zhou,et al. TRUST: A General Framework for Truthful Double Spectrum Auctions , 2009, IEEE INFOCOM 2009.
[9] T. Charles Clancy,et al. A multi-winner cognitive spectrum auction framework with collusion-resistant mechanisms , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[10] Xia Zhou,et al. eBay in the Sky: strategy-proof wireless spectrum auctions , 2008, MobiCom '08.
[11] Oriol Sallent,et al. A Novel Approach for Joint Radio Resource Management Based on Fuzzy Neural Methodology , 2008, IEEE Transactions on Vehicular Technology.
[12] Chin-Chen Chang,et al. New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency , 2008, Journal of Computer Science and Technology.
[13] Haitao Zheng,et al. A General Framework for Wireless Spectrum Auctions , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[14] Rajarathnam Chandramouli,et al. Price dynamics in competitive agile spectrum access markets , 2007, IEEE Journal on Selected Areas in Communications.
[15] Oriol Sallent,et al. A novel on-demand cognitive pilot channel enabling dynamic spectrum allocation , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[16] Hideaki Itoh,et al. An Evolutionary Basis for Preference Behavior in Decision Making under Risk , 2006, 2006 International Conference on Computational Inteligence for Modelling Control and Automation and International Conference on Intelligent Agents Web Technologies and International Commerce (CIMCA'06).
[17] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.
[18] Ed Dawson,et al. Batch verification of validity of bids in homomorphic e-auction , 2006, Comput. Commun..
[19] Duan-Shin Lee,et al. A Joint Design of Distributed QoS Scheduling and Power Control for Wireless Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[20] Panganamala Ramana Kumar,et al. The Number of Neighbors Needed for Connectivity of Wireless Networks , 2004, Wirel. Networks.
[21] Makoto Yokoo,et al. Secure Generalized Vickrey Auction without Third-party Servers , 2004, Financial Cryptography.
[22] Lili Qiu,et al. Impact of Interference on Multi-Hop Wireless Network Performance , 2003, MobiCom '03.
[23] Sven de Vries,et al. Combinatorial Auctions: A Survey , 2003, INFORMS J. Comput..
[24] Makoto Yokoo,et al. Secure Generalized Vickrey Auction Using Homomorphic Encryption , 2003, Financial Cryptography.
[25] Makoto Yokoo,et al. Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions , 2002, AAMAS '02.
[26] Christian Bettstetter,et al. On the minimum node degree and connectivity of a wireless multihop network , 2002, MobiHoc '02.
[27] Makoto Yokoo,et al. Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing , 2002, Financial Cryptography.
[28] Hiroaki Kikuchi,et al. (M+1)st-Price Auction Protocol , 2002, Financial Cryptography.
[29] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[30] Moni Naor,et al. Nonmalleable Cryptography , 2000, SIAM Rev..
[31] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[32] David Pointcheval,et al. Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries , 1999, ASIACRYPT.
[33] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[34] Josh Benaloh,et al. Dense Probabilistic Encryption , 1999 .
[35] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[36] Adi Shamir,et al. How to share a secret , 1979, CACM.
[37] Theodore Groves,et al. Incentives in Teams , 1973 .
[38] William Vickrey,et al. Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .
[39] P. Schrimpf,et al. Dynamic Programming , 2011 .
[40] Vincent Conitzer,et al. Auction protocols , 2010 .
[41] Dusit Niyato,et al. Competitive Pricing for Spectrum Sharing in Cognitive Radio Networks: Dynamic Game, Inefficiency of Nash Equilibrium, and Collusion , 2008, IEEE Journal on Selected Areas in Communications.
[42] D. Boneh,et al. Encryption schemes from bilinear maps , 2007 .
[43] Michel Gendreau,et al. Combinatorial auctions , 2007, Ann. Oper. Res..
[44] E. Maasland,et al. Auction Theory , 2021, Springer Texts in Business and Economics.
[45] Colin Boyd,et al. Security Issues for Electronic Auctions , 2000 .
[46] Joseph Mitola,et al. Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .
[47] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[48] W. K. Vickery,et al. Counter-Speculation Auctions and Competitive Sealed Tenders , 1961 .