A Novel Privacy-preserving Multi-attribute Reverse Auction Scheme with Bidder Anonymity using Multi-server Homomorphic Computation

[1]  Zhihua Xia,et al.  Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.

[2]  Mamata Jenamani,et al.  A New Secure Protocol for Multi-attribute Multi-round E-reverse Auction Using Online Trusted Third Party , 2011, 2011 Second International Conference on Emerging Applications of Information Technology.

[3]  Jian Shen,et al.  Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks , 2016, Inf. Technol. Control..

[4]  Tomoyuki Ishida,et al.  Development of a Zoo Walk Navigation System using the Positional Measurement Technology and the Wireless Communication Technology , 2016, J. Internet Serv. Inf. Secur..

[5]  Caroline Fontaine,et al.  A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..

[6]  Y. Narahari,et al.  Multiattribute electronic procurement using goal programming , 2007, Eur. J. Oper. Res..

[7]  Douglas R. Stinson,et al.  Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme , 2010, ICICS.

[8]  Stefan Strecker,et al.  Information revelation in multiattribute English auctions: A laboratory study , 2010, Decis. Support Syst..

[9]  Thomas Plantard,et al.  Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record , 2016, J. Internet Serv. Inf. Secur..

[10]  Wenbo Shi A provable secure sealed-bid multi-attribute auction scheme under semi-honest model , 2014, Int. J. Commun. Syst..

[11]  Murat Köksalan,et al.  An interactive approach for multi-attribute auctions , 2011, Decis. Support Syst..

[12]  Daniel H. Karney,et al.  Equilibria Existence and Characterization in Auctions: Achievements and Open Questions , 2012 .

[13]  Andreas Jakoby,et al.  A Cryptographically t-Private Auction System , 2009, 2009 Third International Conference on Network and System Security.

[14]  Jian Shen,et al.  Enhanced secure sensor association and key management in wireless body area networks , 2015, Journal of Communications and Networks.

[15]  Justie Su-tzu Juan,et al.  Practical electronic auction scheme with strong anonymity and bidding privacy , 2011, Inf. Sci..

[16]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[17]  Atsuko Miyaji,et al.  A Practical English Auction with One-Time Registration , 2001, ACISP.

[18]  Tanveer A. Zia,et al.  Multi-Layer Network Architecture for Supporting Multiple Applications in Wireless Sensor Networks , 2017, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[19]  Ian Welch,et al.  A protocol for verification of an auction without revealing bid values , 2010, ICCS.

[20]  James G. Phillips,et al.  Video Games and Virtual Reality as Persuasive Technologies for Health Care: An Overview , 2017, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[21]  Peter Schartner,et al.  Unique User-Generated Digital Pseudonyms , 2005, MMM-ACNS.

[22]  Michael O. Rabin,et al.  How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..

[23]  Ping Wang,et al.  On the Implications of Zipf's Law in Passwords , 2016, ESORICS.

[24]  Wen-Guey Tzeng,et al.  Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters , 2004, IEEE Trans. Computers.

[25]  Jin Wang,et al.  Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .

[26]  Yang Wang,et al.  Channel allocation and power control schemes for cross-tier 3GPP LTE networks to support multimedia applications , 2016, Multimedia Tools and Applications.

[27]  Tinghuai Ma,et al.  Social Network and Tag Sources Based Augmenting Collaborative Recommender System , 2015, IEICE Trans. Inf. Syst..

[28]  Alwyn Roshan Pais,et al.  Anonymity and verifiability in multi-attribute reverse auction , 2011, ArXiv.

[29]  Mamata Jenamani,et al.  An efficient reverse auction mechanism for limited supplier base , 2011, Electron. Commer. Res. Appl..

[30]  Che-Chern Lin,et al.  Automatic price negotiation on the web: An agent-based web application using fuzzy expert system , 2011, Expert Syst. Appl..

[31]  Zhong Chen,et al.  Bidder-anonymous English auction protocol based on revocable ring signature , 2012, Expert Syst. Appl..

[32]  Ling Shao,et al.  A rapid learning algorithm for vehicle classification , 2015, Inf. Sci..

[33]  Xin Su,et al.  Power Allocation Scheme for Femto-to-Macro Downlink Interference Reduction for Smart Devices in Ambient Intelligence , 2016, Mob. Inf. Syst..

[34]  Daniel Vanderpooten,et al.  Preference-based English reverse auctions , 2011, Artif. Intell..

[35]  Martin Bichler,et al.  Configurable offers and winner determination in multi-attribute auctions , 2005, Eur. J. Oper. Res..

[36]  Jiaqi Wang,et al.  A Verifiable Sealed-Bid Multi-Qualitative-Attribute Based Auction Scheme in the Semi-Honest Model , 2017, IEEE Access.

[37]  Borja Bordel,et al.  Building enhanced environmental traceability solutions: From Thing-to-Thing communications to Generalized Cyber-Physical Systems , 2017, J. Internet Serv. Inf. Secur..

[38]  Vitaly Shmatikov,et al.  Privacy-Preserving Graph Algorithms in the Semi-honest Model , 2005, ASIACRYPT.

[39]  Martin Bichler,et al.  An experimental analysis of multi-attribute auctions , 2000, Decis. Support Syst..

[40]  Dongqing Xie,et al.  Electronic Sealed-Bid Auctions with Incoercibility , 2011 .

[41]  Xiong Li,et al.  Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications , 2016, Journal of Medical Systems.

[42]  Yu-Fang Chung,et al.  An agent-based English auction protocol using Elliptic Curve Cryptosystem for mobile commerce , 2011, Expert Syst. Appl..

[43]  Xingming Sun,et al.  Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..

[44]  Xingming Sun,et al.  Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.

[45]  Oded Goldreich,et al.  Foundations of Cryptography: Volume 2, Basic Applications , 2004 .

[46]  Giovanni Perrone,et al.  Designing multi-attribute auctions for engineering services procurement in new product development in the automotive context , 2010 .

[47]  Jing He,et al.  Relay Cooperation and Outage Analysis in Cognitive Radio Networks With Energy Harvesting , 2018, IEEE Systems Journal.

[48]  Debiao He,et al.  One-to-many authentication for access control in mobile pay-TV systems , 2016, Science China Information Sciences.

[49]  Zhihua Xia,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[50]  Sherali Zeadally,et al.  Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.

[51]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.