Enabling privacy-preserving auctions in big data
暂无分享,去创建一个
[1] Carmela Troncoso,et al. You cannot hide for long: de-anonymization of real-world dynamic behaviour , 2013, WPES.
[2] Nicole Immorlica,et al. Dynamics of bid optimization in online advertisement auctions , 2007, WWW '07.
[3] Felix Brandt,et al. Efficient Privacy-Preserving Protocols for Multi-unit Auctions , 2005, Financial Cryptography.
[4] Yoav Shoham,et al. Truth revelation in approximately efficient combinatorial auctions , 2002, EC '99.
[5] Noam Nisan,et al. Approximation algorithms for combinatorial auctions with complement-free bidders , 2005, STOC '05.
[6] Mc Mohan Aa Rao D Kishore,et al. Security and Privacy in Big Data , 2017 .
[7] Takayuki Ito,et al. Task Allocation in the RoboCup Rescue Simulation Domain: A Short Note , 2001, RoboCup.
[8] Ronald M. Harstad,et al. Computationally Manageable Combinational Auctions , 1998 .
[9] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[10] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[11] Felix Brandt,et al. On the Existence of Unconditionally Privacy-Preserving Auction Protocols , 2008, TSEC.
[12] Frank Neven,et al. Making Queries Tractable on Big Data with Preprocessing , 2013, Proc. VLDB Endow..
[13] Eyal Kushilevitz,et al. A zero-one law for Boolean privacy , 1989, STOC '89.
[14] Takayuki Ito,et al. Toward Combinatorial Auction-based Better Electric Power Allocation on Sustainable Electric Power Systems , 2011, 2011 IEEE 13th Conference on Commerce and Enterprise Computing.
[15] Alessandro Perina,et al. Person re-identification by symmetry-driven accumulation of local features , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[16] Manoj Kumar Tiwari,et al. Auction-based approach to resolve the scheduling problem in the steel making process , 2006 .
[17] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[18] Hung-Yu Wei,et al. Dynamic Auction Mechanism for Cloud Resource Allocation , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.
[19] S. Rassenti,et al. A Combinatorial Auction Mechanism for Airport Time Slot Allocation , 1982 .
[20] Taeho Jung,et al. Search me if you can: Privacy-preserving location query service , 2012, 2013 Proceedings IEEE INFOCOM.
[21] Rainer A. Rueppel,et al. A new signature scheme based on the DSA giving message recovery , 1993, CCS '93.
[22] Miao Pan,et al. Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer , 2012, Wirel. Networks.
[23] Christian Cachin,et al. Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.
[24] Silvio Micali,et al. Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.
[25] Bo Li,et al. TAHES: Truthful double Auction for Heterogeneous Spectrums , 2012, 2012 Proceedings IEEE INFOCOM.
[26] Sven de Vries,et al. Combinatorial Auctions: A Survey , 2003, INFORMS J. Comput..
[27] Miao Pan,et al. Economic-robust transmission opportunity auction in multi-hop wireless networks , 2013, 2013 Proceedings IEEE INFOCOM.
[28] Hal R. Varian,et al. Economic Mechanism Design for Computerized Agents , 1995, USENIX Workshop on Electronic Commerce.
[29] Jae Hong Seo,et al. A New Additive Homomorphic Encryption based on the co-ACD Problem , 2014, CCS.
[30] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[31] Makoto Yokoo,et al. Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing , 2002, Financial Cryptography.
[32] Paul R. Milgrom,et al. Putting Auction Theory to Work: The Simultaneous Ascending Auction , 1999, Journal of Political Economy.
[33] David Levine,et al. CABOB: A Fast Optimal Algorithm for Combinatorial Auctions , 2001, IJCAI.
[34] Xiang-Yang Li,et al. Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets , 2013, ArXiv.
[35] Roger B. Myerson,et al. Optimal Auction Design , 1981, Math. Oper. Res..
[36] Jan Camenisch,et al. Blind Signatures Based on the Discrete Logarithm Problem , 1994, EUROCRYPT.
[37] Karl Aberer,et al. Matching demand with supply in the smart grid using agent-based multiunit auction , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).
[38] Michel Gendreau,et al. Combinatorial auctions , 2007, Ann. Oper. Res..
[39] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[40] Xinbing Wang,et al. Spectrum Sharing in Cognitive Radio Networks—An Auction-Based Approach , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[41] Tuomas Sandholm,et al. Algorithm for optimal winner determination in combinatorial auctions , 2002, Artif. Intell..
[42] Ronald Fagin,et al. Proceedings of the thirty-seventh annual ACM symposium on Theory of computing , 2005, STOC 2005.
[43] Makoto Yokoo,et al. Secure Generalized Vickrey Auction without Third-party Servers , 2004, Financial Cryptography.
[44] Kunio Kobayashi,et al. Efficient Sealed-Bid Auction Using Hash Chain , 2000, ICISC.
[45] Omer Tene Jules Polonetsky,et al. Privacy in the Age of Big Data: A Time for Big Decisions , 2012 .
[46] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[47] Silvio Micali,et al. Robustly Leveraging Collusion in Combinatorial Auctions , 2010, ICS.
[48] K. K. Ramakrishnan,et al. iDEAL: Incentivized Dynamic Cellular Offloading via Auctions , 2013, IEEE/ACM Transactions on Networking.
[49] Yunhao Liu,et al. Verifiable private multi-party computation: Ranging and ranking , 2013, 2013 Proceedings IEEE INFOCOM.
[50] Xiang-Yang Li,et al. Privacy preserving cloud data access with multi-authorities , 2012, 2013 Proceedings IEEE INFOCOM.
[51] Fan Wu,et al. SPRING: A Strategy-proof and Privacy preserving spectrum auction mechanism , 2013, 2013 Proceedings IEEE INFOCOM.
[52] D. S. Johnson,et al. Proceedings of the twenty-first annual ACM symposium on Theory of computing , 1989, STOC 1989.
[53] Noam Nisan,et al. Truthful approximation mechanisms for restricted combinatorial auctions , 2008, Games Econ. Behav..
[54] Makoto Yokoo,et al. Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions , 2002, AAMAS '02.
[55] Daniel Grosu,et al. Combinatorial Auction-Based Allocation of Virtual Machine Instances in Clouds , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[56] Eyal Kushilevitz,et al. Privacy and communication complexity , 1989, 30th Annual Symposium on Foundations of Computer Science.
[57] Marceau Coupechoux,et al. An Auction Framework for Spectrum Allocation with Interference Constraint in Cognitive Radio Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[58] Moni Naor,et al. Privacy preserving auctions and mechanism design , 1999, EC '99.
[59] Shaojie Tang,et al. Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation , 2013, 2013 Proceedings IEEE INFOCOM.
[60] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[61] Ian Welch,et al. Development and Evaluation of a Secure, Privacy Preserving Combinatorial Auction , 2011, AISC.
[62] Paul F. Syverson,et al. Fair On-Line Auctions without Special Trusted Parties , 1999, Financial Cryptography.
[63] Jeffrey K. MacKie-Mason,et al. Generalized Vickrey Auctions , 1994 .