4.4 Article

Privacy-preserving combinatorial auction without an auctioneer

Related references

Note: Only part of the references are listed.
Article Automation & Control Systems

Mutual Privacy Preserving k-Means Clustering in Social Participatory Sensing

Kai Xing et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)

Article Computer Science, Information Systems

Secure multi-unit sealed first-price auction mechanisms

Wei Li et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Proceedings Paper Computer Science, Information Systems

A Bidder-Oriented Privacy-Preserving VCG Auction Scheme

Maya Larson et al.

WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (2015)

Proceedings Paper Computer Science, Information Systems

A Secure Multi-unit Sealed First-Price Auction Mechanism

Maya Larson et al.

WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (2015)

Article Computer Science, Information Systems

Achieving Accountability in Smart Grid

Jing Liu et al.

IEEE SYSTEMS JOURNAL (2014)

Article Engineering, Electrical & Electronic

Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme

Chunqiang Hu et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2013)

Article Computer Science, Software Engineering

SECRET IMAGE SHARING BASED ON CHAOTIC MAP AND CHINESE REMAINDER THEOREM

Chunqiang Hu et al.

INTERNATIONAL JOURNAL OF WAVELETS MULTIRESOLUTION AND INFORMATION PROCESSING (2012)

Article Computer Science, Theory & Methods

Verifiable multi-secret sharing based on LFSR sequences

Chunqiang Hu et al.

THEORETICAL COMPUTER SCIENCE (2012)

Article Computer Science, Information Systems

Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer

Miao Pan et al.

WIRELESS NETWORKS (2012)

Article Engineering, Electrical & Electronic

Purging the Back-Room Dealing: Secure Spectrum Auction Leveraging Paillier Cryptosystem

Miao Pan et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2011)

Article Computer Science, Hardware & Architecture

An efficient threshold verifiable multi-secret sharing

Massoud Hadian Dehkordi et al.

COMPUTER STANDARDS & INTERFACES (2008)