Author:
Sun Yanbin,Sun Yan,Luo Mingxing,Gu Lize,Zheng Shihui,Yang Yixian
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Information Systems,Theoretical Computer Science,Software
Reference9 articles.
1. Chang, C. C., & Chang, Y. F. (2003). Efficient anonymous auction protocols with freewheeling bids. Computers & Security, 22(8), 728–734.
2. Chaum, D., & Heyst, E. (1991). Group signatures. In Advances in cryptology, Eurocrypt’91 (pp. 257–265).
3. Chung, Y. F., Huang, K. H., Lee, H. H., Lai, F. P., & Chen, T. S. (2008). Bidder-anonymous English auction scheme with privacy and public verifiability. The Journal of Systems and Software, 81(1), 113–119.
4. Juang, W. S., Liaw, H. T., Lin, P. C., & Lin, C. K. (2005). The design of a secure and fair sealed-bid auction service. Mathematical and Computer Modelling, 41(8–9), 973–985.
5. Kudo, M. (1998). Secure electronic sealed-bid auction protocol with public key cryptography. IEICE Transactions on Fundamentals, E81-A(1), 20–27.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献