Design of Robust Business-to-Business Electronic Marketplaces with Guaranteed Privacy
暂无分享,去创建一个
[1] Philip S. Yu,et al. On balancing the load in a clustered web farm , 2001, TOIT.
[2] Eric van Heck,et al. Re-Engineering the Dutch Flower Auctions: A Framework for Analyzing Exchange Organizations , 1996, Inf. Syst. Res..
[3] Steve Muylle,et al. Online support for commerce processes by web retailers , 2003, Decis. Support Syst..
[4] Hugo Krawczyk,et al. Public-key cryptography and password protocols , 1999 .
[5] Kevin Zhu,et al. Information Transparency in Electronic Marketplaces: Why Data Transparency May Hinder the Adoption of B2B Exchanges , 2002, Electron. Mark..
[6] Felix Brandt,et al. Cryptographic Protocols for Secure Second-Price Auctions , 2001, CIA.
[7] Mayuram S. Krishnan,et al. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..
[8] Paul F. Syverson,et al. Onion routing , 1999, CACM.
[9] Paul F. Syverson,et al. Unlinkable serial transactions: protocols and applications , 1999, TSEC.
[10] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[11] Valtteri Niemi,et al. Secure Vickrey Auctions without Threshold Trust , 2002, Financial Cryptography.
[12] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[13] Maria L. Gini,et al. Security model for a multi-agent marketplace , 2003, ICEC '03.
[14] T. T. Moh,et al. A public key system with signature and master key functions , 1999 .
[15] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[16] E. Anderson,et al. The New E-Commerce Intermediaries , 2002 .
[17] James Aweya,et al. An adaptive load balancing scheme for web servers , 2002, Int. J. Netw. Manag..
[18] Kevin Zhu,et al. Information Transparency of Business-to-Business Electronic Markets: A Game-Theoretic Analysis , 2004, Manag. Sci..
[19] Ronald L. Rivest,et al. Time-lock Puzzles and Timed-release Crypto , 1996 .
[20] Paul Syverson,et al. Onion Routing for Anonymous and Private Internet Connections , 1999 .
[21] O. Williamson,et al. Markets and Hierarchies: Analysis and Antitrust Implications. , 1977 .
[22] Matthew K. Franklin,et al. The Design and Implementation of a Secure Auction Service , 1996, IEEE Trans. Software Eng..