Efficient private bidding and auctions with an oblivious third party
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Cryptographic Protocols for Auctions and Bargaining
Proceedings of the Colloquium in Honor of Arto Salomaa on Results and Trends in Theoretical Computer Science
The design and implementation of a secure auction service
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Design and verification of secure e-commerce protocols
Design and verification of secure e-commerce protocols
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Electronic auctions with private bids
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Secure agent-mediated auctionlike negotiation protocol for internet retail commerce
CIA'99 Proceedings of the 3rd international conference on Cooperative information agents III
Formal verification of e-auction protocols
POST'13 Proceedings of the Second international conference on Principles of Security and Trust
Hi-index | 0.01 |
Online auction is an interesting component of the electronic commerce. Goods and services that used to be sold in conventional brick-and-mortar stores at fixed prices can now be purchased online at their "true" valuations in the eyes of multiple customers. With the growing sheer number and total value of these transactions conducted under the online auction model, the actual security becomes a controversial issue. This is where cryptographic methods, some already decades old, others brand-new and specialized for the application in the realm of auctions, come into the game. This paper attempts to give an overview of the current state of affairs and convergent issues for cryptographic methods applicable to the field of on-line auctions.