暂无分享,去创建一个
[1] Leandros Tassiulas,et al. A Double-Auction Mechanism for Mobile Data-Offloading Markets , 2015, IEEE/ACM Transactions on Networking.
[2] Makoto Yokoo,et al. Secure Generalized Vickrey Auction without Third-party Servers , 2004, Financial Cryptography.
[3] Bart de Keijzer,et al. Approximately Efficient Double Auctions with Strong Budget Balance , 2016, SODA.
[4] Ahmad-Reza Sadeghi,et al. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima , 2009, IACR Cryptol. ePrint Arch..
[5] Nicholas R. Jennings,et al. An equilibrium analysis of trading across multiple double auction marketplaces using fictitious play , 2016, Electron. Commer. Res. Appl..
[6] Ahmad Baraani-Dastjerdi,et al. Bidding strategy for agents in multi-attribute combinatorial double auction , 2015, Expert Syst. Appl..
[7] Liusheng Huang,et al. On Privacy-Preserving Cloud Auction , 2016, 2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS).
[8] Manuel Blum,et al. An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information , 1985, CRYPTO.
[9] R. McAfee,et al. A dominant strategy double auction , 1992 .
[10] Simon Parsons,et al. On the effects of competition between agent-based double auction markets , 2014, Electron. Commer. Res. Appl..
[11] Yehuda Lindell,et al. Efficient Secure Two-Party Protocols: Techniques and Constructions , 2010 .
[12] Praveen Gauravaram,et al. Updates on Sorting of Fully Homomorphic Encrypted Data , 2015, 2015 International Conference on Cloud Computing Research and Innovation (ICCCRI).
[13] Makoto Yokoo,et al. Secure Generalized Vickrey Auction Using Homomorphic Encryption , 2003, Financial Cryptography.
[14] Liusheng Huang,et al. ITSEC: An information-theoretically secure framework for truthful spectrum auctions , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[15] Ho-fung Leung,et al. An Adaptive Attitude Bidding Strategy for Agents in Continuous Double Auctions , 2005, EEE.
[16] Lu Li,et al. Secure double spectrum auctions , 2015, 2015 IEEE 23rd International Symposium on Quality of Service (IWQoS).
[17] Ed Dawson,et al. Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction , 2002, ICICS.
[18] Muriati Mukhtar,et al. A combinatorial double auction resource allocation model in cloud computing , 2016, Inf. Sci..
[19] Wenliang Du,et al. Bureaucratic protocols for secure two-party sorting, selection, and permuting , 2010, ASIACCS '10.
[20] Fan Wu,et al. SPRING: A Strategy-proof and Privacy preserving spectrum auction mechanism , 2013, 2013 Proceedings IEEE INFOCOM.
[21] Fei Wang,et al. PS-TRUST: Provably secure solution for truthful double spectrum auctions , 2013, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[22] XiaoHua Xu,et al. TODA: Truthful Online Double Auction for Spectrum Allocation in Wireless Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).
[23] Dongrui Fan,et al. High performance comparison-based sorting algorithm on many-core GPUs , 2010, 2010 IEEE International Symposium on Parallel & Distributed Processing (IPDPS).
[24] SamimiParnia,et al. A combinatorial double auction resource allocation model in cloud computing , 2016 .
[25] Elmar Wolfstetter,et al. Bid Rigging - an Analysis of Corruption in Auctions , 2005, SSRN Electronic Journal.
[26] Song Guo,et al. A Truthful Double Auction for Device-to-Device Communications in Cellular Networks , 2016, IEEE Journal on Selected Areas in Communications.