Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
The Design and Implementation of a Secure Auction Service
IEEE Transactions on Software Engineering
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Communications of the ACM
Public-key cryptography and password protocols
ACM Transactions on Information and System Security (TISSEC)
Unlinkable serial transactions: protocols and applications
ACM Transactions on Information and System Security (TISSEC)
On balancing the load in a clustered web farm
ACM Transactions on Internet Technology (TOIT)
An adaptive load balancing scheme for web servers
International Journal of Network Management
Tarzan: a peer-to-peer anonymizing network layer
Proceedings of the 9th ACM conference on Computer and communications security
Online support for commerce processes by web retailers
Decision Support Systems
Reengineering the Dutch Flower Auctions: a Framework for Analyzing Exchange Organizations
Information Systems Research
Time-lock Puzzles and Timed-release Crypto
Time-lock Puzzles and Timed-release Crypto
Security model for a multi-agent marketplace
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
Secure Vickrey auctions without threshold trust
FC'02 Proceedings of the 6th international conference on Financial cryptography
Hi-index | 0.01 |
Firms that set up electronic marketplaces to enhance their supply and/or distribution channels face challenges in attracting their competitors to participate. A major obstacle is the perception that the owner can unfairly exploit trading information for competitive advantage. In this paper, we propose a marketplace design that shifts the locus of control over trader privacy from the marketplace operator to each individual trader. We show how online transactions between trading partners can be conducted in total privacy, so that not even the marketplace owner/operator can exploit transaction information for strategic purposes. At the same time, our approach includes robust methods for transaction integrity and nonrepudiation, as well as posttransaction dispute resolution.