Secure Computing, Economy, and Trust: A Generic Solution for Secure Auctions with Real-World Applications
暂无分享,去创建一个
Ivan Damgård | Tomas Toft | Kurt Nielsen | Peter Bogetoft | Thomas P. Jakobsen | Jakob Pagter | I. Damgård | P. Bogetoft | K. Nielsen | J. Pagter | Tomas Toft
[1] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.
[2] R. McAfee,et al. A dominant strategy double auction , 1992 .
[3] F. Brandt. Private Public Choice , 2003 .
[4] Felix Brandt,et al. Cryptographic Protocols for Secure Second-Price Auctions , 2001, CIA.
[5] Olivier Danvy,et al. On the dynamic extent of delimited continuations , 2005, Inf. Process. Lett..
[6] Felix Brandt,et al. Efficient Privacy-Preserving Protocols for Multi-unit Auctions , 2005, Financial Cryptography.
[7] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[8] Olivier Danvy,et al. Program Extraction From Proofs of Weak Head Normalization , 2005, MFPS.
[9] Peter Bro Miltersen,et al. Reviewing bounds on the circuit size of the hardest functions , 2005, Inf. Process. Lett..
[10] Adi Shamir,et al. How to share a secret , 1979, CACM.
[11] Christian Cachin,et al. Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.
[12] Olivier Danvy,et al. An Operational Foundation for Delimited Continuations in the CPS Hierarchy , 2005, Log. Methods Comput. Sci..
[13] Michael P. Wellman,et al. Walverine: a Walrasian trading agent , 2003, AAMAS '03.
[14] Valtteri Niemi,et al. Secure Vickrey Auctions without Threshold Trust , 2002, Financial Cryptography.
[15] Steven R. Williams,et al. The Rate of Convergence to Efficiency in the Buyer's Bid Double Auction as the Market Becomes Large , 1989 .
[16] Matthew K. Franklin,et al. The design and implementation of a secure auction service , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[17] Dieter Nautz. Optimal bidding in multi-unit auctions with many bidders , 1995 .
[18] P. Klemperer. Auction Theory: A Guide to the Literature , 1999 .
[19] Robert H. Wilson. Incentive Efficiency of Double Auctions , 1985 .
[20] Olivier Danvy,et al. On obtaining the Boyer-Moore string-matching algorithm by partial evaluation , 2006, Inf. Process. Lett..
[21] J. Laffont. Advances in Economic Theory , 1995 .
[22] Martin Shubik,et al. A strategic market game with complete markets , 1990 .
[23] Ivan Damgård,et al. A Quantum Cipher with Near Optimal Key-Recycling , 2005, CRYPTO.
[24] Ho-fung Leung,et al. Secure Double Auction Protocols with Full Privacy Protection , 2003, ICISC.
[25] Sven de Vries,et al. Combinatorial Auctions: A Survey , 2003, INFORMS J. Comput..
[26] O. Danvy,et al. A Simple Proof of a Folklore Theorem about Delimited Control , 2005 .
[27] M. Rothkopf,et al. Why Are Vickrey Auctions Rare? , 1990, Journal of Political Economy.
[28] Ivan Damgård,et al. Multiparty Computation from Threshold Homomorphic Encryption , 2000, EUROCRYPT.
[29] T. Bewley. Advances in Economic Theory: Fifth World Congress , 2009 .
[30] Daniel Friedman,et al. Competitivity in Auction Markets: An Experimental and Theoretical Investigation , 1995 .
[31] Jan Camenisch,et al. Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products , 2002, CRYPTO.
[32] A. Yao. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[33] Kiho Yoon,et al. The Modified Vickrey Double Auction , 2001, J. Econ. Theory.
[34] David Porter,et al. Combinatorial auction design , 2003, Proceedings of the National Academy of Sciences of the United States of America.
[35] Joan Feigenbaum,et al. Secure computation of surveys , 2004 .
[36] Edith Elkind,et al. Interleaving Cryptography and Mechanism Design: The Case of Online Auctions , 2004, Financial Cryptography.
[37] Michael B. Gordy. Hedging Winner's Curse with Multiple Bids: Evidence from the Portuguese Treasury Bill Auction , 1999, Review of Economics and Statistics.
[38] Silvio Micali,et al. The Round Complexity of Secure Protocols (Extended Abstract) , 1990, STOC 1990.
[39] Moni Naor,et al. Privacy preserving auctions and mechanism design , 1999, EC '99.
[40] Shai Halevi,et al. A Cryptographic Solution to a Game Theoretic Problem , 2000, CRYPTO.
[41] Léon Walras. Éléments d'économie politique pure , 1889 .
[42] Ho-fung Leung,et al. Anonymity and security in continuous double auctions for Internet retails market , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[43] Yuval Ishai,et al. Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation , 2005, TCC.
[44] Michael P. Wellman,et al. The WALRAS Algorithm: A Convergent Distributed Implementation of General Equilibrium Outcomes , 1998 .
[45] Peter Cramton,et al. Electricity market design: the good, the bad, and the ugly , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[46] Olivier Danvy,et al. A concrete framework for environment machines , 2005, TOCL.
[47] M. Satterthwaite,et al. Efficient Mechanisms for Bilateral Trading , 1983 .