Privacy-Preserving Strategyproof Auction Mechanisms for Resource Allocation in Wireless Communications
暂无分享,去创建一个
Xiang-Yang Li | He Huang | Yang Du | Mingjun Xiao | Hongli Xu | Miaomiao Tian | Yu-e Sun | Xiangyang Li | Mingjun Xiao | Yang Du | Hongli Xu | He Huang | M. Tian | Yu-e Sun
[1] Zongpeng Li,et al. Strategyproof auctions for balancing social welfare and fairness in secondary spectrum markets , 2011, 2011 Proceedings IEEE INFOCOM.
[2] Ari Juels,et al. A Two-Server, Sealed-Bid Auction Protocol , 2002, Financial Cryptography.
[3] XiaoHua Xu,et al. TODA: Truthful Online Double Auction for Spectrum Allocation in Wireless Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).
[4] Felix Brandt,et al. Secure and Private Auctions without Auctioneers , 2002 .
[5] Katherine Lai. The Knapsack Problem and Fully Polynomial Time Approximation Schemes (FPTAS) , 2006 .
[6] Alan Scheller-Wolf,et al. Design of a Multi–Unit Double Auction E–Market , 2002, Comput. Intell..
[7] Xia Zhou,et al. eBay in the Sky: strategy-proof wireless spectrum auctions , 2008, MobiCom '08.
[8] Ronald M. Harstad,et al. Computationally Manageable Combinational Auctions , 1998 .
[9] Michael P. Wellman,et al. Flexible double auctions for electronic commerce: theory and implementation , 1998, Decis. Support Syst..
[10] E. Maasland,et al. Auction Theory , 2021, Springer Texts in Business and Economics.
[11] Mingyan Liu,et al. Mining Spectrum Usage Data: A Large-Scale Spectrum Measurement Study , 2009, IEEE Transactions on Mobile Computing.
[12] Daniel Grosu,et al. Combinatorial Auction-Based Allocation of Virtual Machine Instances in Clouds , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[13] Moni Naor,et al. Privacy preserving auctions and mechanism design , 1999, EC '99.
[14] Jacques Stern,et al. Non-interactive Private Auctions , 2002, Financial Cryptography.
[15] Michel Gendreau,et al. Combinatorial auctions , 2007, Ann. Oper. Res..
[16] Moshe Babaioff,et al. Incentive-compatible, budget-balanced, yet highly efficient auctions for supply chain formation , 2003, EC '03.
[17] Felix Brandt,et al. Efficient Privacy-Preserving Protocols for Multi-unit Auctions , 2005, Financial Cryptography.
[18] Zuo-Jun Max Shen,et al. Truthful Double Auction Mechanisms , 2008, Oper. Res..
[19] Miao Pan,et al. Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer , 2012, Wirel. Networks.
[20] Xiang-Yang Li,et al. Online market driven spectrum scheduling and auction , 2009, CoRoNet '09.
[21] Mo Dong,et al. Combinatorial auction with time-frequency flexibility in cognitive radio networks , 2012, 2012 Proceedings IEEE INFOCOM.
[22] K. K. Ramakrishnan,et al. iDEAL: Incentivized Dynamic Cellular Offloading via Auctions , 2013, IEEE/ACM Transactions on Networking.
[23] Noam Nisan,et al. Truthful approximation mechanisms for restricted combinatorial auctions , 2008, Games Econ. Behav..
[24] Miao Pan,et al. Dealing with the Untrustworthy Auctioneer in Combinatorial Spectrum Auctions , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[25] Masayuki Abe,et al. M+1-st Price Auction Using Homomorphic Encryption , 2002, Public Key Cryptography.
[26] Xiang-Yang Li,et al. Near-optimal truthful spectrum auction mechanisms with spatial and temporal reuse in wireless networks , 2013, MobiHoc.
[27] Valtteri Niemi,et al. Secure Vickrey Auctions without Threshold Trust , 2002, Financial Cryptography.
[28] Felix Brandt,et al. How to obtain full privacy in auctions , 2006, International Journal of Information Security.
[29] Yoav Shoham,et al. Truth revelation in approximately efficient combinatorial auctions , 2002, EC '99.
[30] Fan Wu,et al. SPRING: A Strategy-proof and Privacy preserving spectrum auction mechanism , 2013, 2013 Proceedings IEEE INFOCOM.
[31] Makoto Yokoo,et al. Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing , 2002, Financial Cryptography.
[32] Felix Brandt,et al. Fully Private Auctions in a Constant Number of Rounds , 2003, Financial Cryptography.
[33] Noam Nisan,et al. Approximation algorithms for combinatorial auctions with complement-free bidders , 2005, STOC '05.
[34] Hung-Yu Wei,et al. Dynamic Auction Mechanism for Cloud Resource Allocation , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.
[35] Christian Cachin,et al. Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.
[36] Yu-Fang Chung,et al. Bidder-anonymous English auction scheme with privacy and public verifiability , 2008, J. Syst. Softw..
[37] Xiang-Yang Li,et al. Privacy-Preserving Strategyproof Auction Mechanisms for Resource Allocation , 2017 .
[38] Hiroaki Kikuchi,et al. (M+1)st-Price Auction Protocol , 2002, Financial Cryptography.
[39] Xiang-Yang Li,et al. SALSA: Strategyproof Online Spectrum Admissions for Wireless Networks , 2010, IEEE Transactions on Computers.
[40] He Huang,et al. Truthful Auction for Resource Allocation in Cooperative Cognitive Radio Networks , 2015, 2015 24th International Conference on Computer Communication and Networks (ICCCN).
[41] Xinbing Wang,et al. Spectrum Sharing in Cognitive Radio Networks—An Auction-Based Approach , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).