Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP
Proceedings of the 7th ACM conference on Computer and communications security
A Practical English Auction with One-Time Registration
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Optimal Bid Sequences for Multiple-Object Auctions with Unequal Budgets
ISAAC '00 Proceedings of the 11th International Conference on Algorithms and Computation
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
Efficient Public Auction with One-Time Registration and Public Verifiability
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Mix and Match: Secure Function Evaluation via Ciphertexts
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Key-Privacy in Public-Key Encryption
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
(M+1)st-Price Auction Protocol
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees
ISW '00 Proceedings of the Third International Workshop on Information Security
Efficient Sealed-Bid Auctions for Massive Numbers of Bidders with Lump Comparison
ISC '01 Proceedings of the 4th International Conference on Information Security
Receipt-Free Sealed-Bid Auction
ISC '02 Proceedings of the 5th International Conference on Information Security
M+1-st Price Auction Using Homomorphic Encryption
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Five sealed-bid auction models
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
Publicly Verifiable Auctions with Minimal Leakage
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
MoRVAM: A reverse Vickrey auction system for mobile commerce
Expert Systems with Applications: An International Journal
On the Existence of Unconditionally Privacy-Preserving Auction Protocols
ACM Transactions on Information and System Security (TISSEC)
Designing a secure e-tender submission protocol
Electronic Commerce Research
A new reverse auction agent system for m-commerce using mobile agents
Computer Standards & Interfaces
A secure reverse Vickrey auction scheme with bid privacy
Information Sciences: an International Journal
Efficient bid validity check in ElGamal-based sealed-bid e-auction
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
A second-price sealed-bid auction with verifiable discriminant of ρo-th root
FC'02 Proceedings of the 6th international conference on Financial cryptography
A two-server, sealed-bid auction protocol
FC'02 Proceedings of the 6th international conference on Financial cryptography
Non-interactive auction scheme with strong privacy
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Mediated traceable anonymous encryption
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
On server trust in private proxy auctions
Electronic Commerce Research
Identity based encryption: Progress and challenges
Information Security Tech. Report
Unconditionally secure first-price auction protocols using a multicomponent commitment scheme
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Secure E-auction for mobile users with low-capability devices in wireless network
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Auctions in do-not-track compliant internet advertising
Proceedings of the 18th ACM conference on Computer and communications security
TCC'10 Proceedings of the 7th international conference on Theory of Cryptography
The sampling twice technique for the RSA-Based cryptosystems with anonymity
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Bidder-anonymous English auction protocol based on revocable ring signature
Expert Systems with Applications: An International Journal
The design of a secure and fair sealed-bid auction service
Mathematical and Computer Modelling: An International Journal
A robust and plaintext-aware variant of signed elgamal encryption
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Hi-index | 0.01 |