A Novel Privacy-preserving Multi-attribute Reverse Auction Scheme with Bidder Anonymity using Multi-server Homomorphic Computation
暂无分享,去创建一个
Jiaqi Wang | Dongmin Choi | Wenbo Shi | Jinxiu Zhu | YuPeng Wang | Jiaqi Wang | Wenbo Shi | Jinxiu Zhu | Dongmin Choi | YuPeng Wang | Jiaqi Wang | Yupeng Wang
[1] Zhihua Xia,et al. Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.
[2] Mamata Jenamani,et al. A New Secure Protocol for Multi-attribute Multi-round E-reverse Auction Using Online Trusted Third Party , 2011, 2011 Second International Conference on Emerging Applications of Information Technology.
[3] Jian Shen,et al. Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks , 2016, Inf. Technol. Control..
[4] Tomoyuki Ishida,et al. Development of a Zoo Walk Navigation System using the Positional Measurement Technology and the Wireless Communication Technology , 2016, J. Internet Serv. Inf. Secur..
[5] Caroline Fontaine,et al. A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..
[6] Y. Narahari,et al. Multiattribute electronic procurement using goal programming , 2007, Eur. J. Oper. Res..
[7] Douglas R. Stinson,et al. Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme , 2010, ICICS.
[8] Stefan Strecker,et al. Information revelation in multiattribute English auctions: A laboratory study , 2010, Decis. Support Syst..
[9] Thomas Plantard,et al. Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record , 2016, J. Internet Serv. Inf. Secur..
[10] Wenbo Shi. A provable secure sealed-bid multi-attribute auction scheme under semi-honest model , 2014, Int. J. Commun. Syst..
[11] Murat Köksalan,et al. An interactive approach for multi-attribute auctions , 2011, Decis. Support Syst..
[12] Daniel H. Karney,et al. Equilibria Existence and Characterization in Auctions: Achievements and Open Questions , 2012 .
[13] Andreas Jakoby,et al. A Cryptographically t-Private Auction System , 2009, 2009 Third International Conference on Network and System Security.
[14] Jian Shen,et al. Enhanced secure sensor association and key management in wireless body area networks , 2015, Journal of Communications and Networks.
[15] Justie Su-tzu Juan,et al. Practical electronic auction scheme with strong anonymity and bidding privacy , 2011, Inf. Sci..
[16] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[17] Atsuko Miyaji,et al. A Practical English Auction with One-Time Registration , 2001, ACISP.
[18] Tanveer A. Zia,et al. Multi-Layer Network Architecture for Supporting Multiple Applications in Wireless Sensor Networks , 2017, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[19] Ian Welch,et al. A protocol for verification of an auction without revealing bid values , 2010, ICCS.
[20] James G. Phillips,et al. Video Games and Virtual Reality as Persuasive Technologies for Health Care: An Overview , 2017, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[21] Peter Schartner,et al. Unique User-Generated Digital Pseudonyms , 2005, MMM-ACNS.
[22] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[23] Ping Wang,et al. On the Implications of Zipf's Law in Passwords , 2016, ESORICS.
[24] Wen-Guey Tzeng,et al. Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters , 2004, IEEE Trans. Computers.
[25] Jin Wang,et al. Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .
[26] Yang Wang,et al. Channel allocation and power control schemes for cross-tier 3GPP LTE networks to support multimedia applications , 2016, Multimedia Tools and Applications.
[27] Tinghuai Ma,et al. Social Network and Tag Sources Based Augmenting Collaborative Recommender System , 2015, IEICE Trans. Inf. Syst..
[28] Alwyn Roshan Pais,et al. Anonymity and verifiability in multi-attribute reverse auction , 2011, ArXiv.
[29] Mamata Jenamani,et al. An efficient reverse auction mechanism for limited supplier base , 2011, Electron. Commer. Res. Appl..
[30] Che-Chern Lin,et al. Automatic price negotiation on the web: An agent-based web application using fuzzy expert system , 2011, Expert Syst. Appl..
[31] Zhong Chen,et al. Bidder-anonymous English auction protocol based on revocable ring signature , 2012, Expert Syst. Appl..
[32] Ling Shao,et al. A rapid learning algorithm for vehicle classification , 2015, Inf. Sci..
[33] Xin Su,et al. Power Allocation Scheme for Femto-to-Macro Downlink Interference Reduction for Smart Devices in Ambient Intelligence , 2016, Mob. Inf. Syst..
[34] Daniel Vanderpooten,et al. Preference-based English reverse auctions , 2011, Artif. Intell..
[35] Martin Bichler,et al. Configurable offers and winner determination in multi-attribute auctions , 2005, Eur. J. Oper. Res..
[36] Jiaqi Wang,et al. A Verifiable Sealed-Bid Multi-Qualitative-Attribute Based Auction Scheme in the Semi-Honest Model , 2017, IEEE Access.
[37] Borja Bordel,et al. Building enhanced environmental traceability solutions: From Thing-to-Thing communications to Generalized Cyber-Physical Systems , 2017, J. Internet Serv. Inf. Secur..
[38] Vitaly Shmatikov,et al. Privacy-Preserving Graph Algorithms in the Semi-honest Model , 2005, ASIACRYPT.
[39] Martin Bichler,et al. An experimental analysis of multi-attribute auctions , 2000, Decis. Support Syst..
[40] Dongqing Xie,et al. Electronic Sealed-Bid Auctions with Incoercibility , 2011 .
[41] Xiong Li,et al. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications , 2016, Journal of Medical Systems.
[42] Yu-Fang Chung,et al. An agent-based English auction protocol using Elliptic Curve Cryptosystem for mobile commerce , 2011, Expert Syst. Appl..
[43] Xingming Sun,et al. Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..
[44] Xingming Sun,et al. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.
[45] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[46] Giovanni Perrone,et al. Designing multi-attribute auctions for engineering services procurement in new product development in the automotive context , 2010 .
[47] Jing He,et al. Relay Cooperation and Outage Analysis in Cognitive Radio Networks With Energy Harvesting , 2018, IEEE Systems Journal.
[48] Debiao He,et al. One-to-many authentication for access control in mobile pay-TV systems , 2016, Science China Information Sciences.
[49] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[50] Sherali Zeadally,et al. Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.
[51] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.