Practical electronic auction scheme with strong anonymity and bidding privacy
暂无分享,去创建一个
[1] James V. Hansen,et al. Standards and verification for fair-exchange and atomicity in e-commerce transactions , 2006, Inf. Sci..
[2] Atsuko Miyaji,et al. A Practical English Auction with One-Time Registration , 2001, ACISP.
[3] Vincent P. Crawford,et al. A Dual Dutch Auction in Taipei: The Choice of Numeraire and Auction Form in Multi-Object Auctions with Bundling , 2000 .
[4] Walter Baets,et al. The impact of electronic markets: the case of the Dutch Flower Auctions , 1996, J. Strateg. Inf. Syst..
[5] Jacques Traoré,et al. An Online Public Auction Protocol Protecting Bidder Privacy , 2000, ACISP.
[6] Kouichi Sakurai,et al. English vs. sealed bid in anonymous electronic auction protocols , 2001, Proceedings Tenth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE 2001.
[7] David Chaum,et al. Undeniable Signatures , 1989, CRYPTO.
[8] Chin-Chen Chang,et al. Enhanced anonymous auction protocols with freewheeling bids , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[9] Kunio Kobayashi,et al. Efficient Sealed-Bid Auction Using Hash Chain , 2000, ICISC.
[10] Atsuko Miyaji,et al. A Practical English Auction with Simple Revocation , 2002 .
[11] Byoungcheon Lee,et al. Efficient Public Auction with One-Time Registration and Public Verifiability , 2001, INDOCRYPT.
[12] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[13] Christian Cachin,et al. Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.
[14] Yu-Fang Chung,et al. Bidder-anonymous English auction scheme with privacy and public verifiability , 2008, J. Syst. Softw..
[15] Jianhua Li,et al. An improvement on efficient anonymous auction protocols , 2005, Comput. Secur..
[16] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[17] Hugo Krawczyk,et al. Advances in Cryptology - CRYPTO '98 , 1998 .
[18] David C. Yen,et al. A secure reverse Vickrey auction scheme with bid privacy , 2006, Inf. Sci..
[19] Chin-Chen Chang,et al. Efficient anonymous auction protocols with freewheeling bids , 2003, Comput. Secur..
[20] Chin-Chen Chang,et al. A countable and time-bound password-based user authentication scheme for the applications of electronic commerce , 2009, Inf. Sci..
[21] Justie Su-tzu Juan,et al. A Practical English Auction Based on the Discrete Logarithms , 2007, Security and Management.
[22] Wen-Shenq Juang,et al. The design of a secure and fair sealed-bid auction service, , 2005, Math. Comput. Model..
[23] Joe Kilian,et al. Identity Escrow , 1998, CRYPTO.
[24] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[25] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[26] Michiharu Kudo,et al. Secure Electronic Sealed-Bid Auction Protocol with Public Key Cryptography (Special Section on Cryptography and Information Security) , 1998 .