Some Remarks on Security of Receipt-Free E-auction.
Yong-Sork HerKenji ImamotoKouichi SakuraiPublished in: ICITA (2) (2005)
Keyphrases
- auction protocol
- information security
- security issues
- security policies
- statistical databases
- intrusion detection
- access control
- security analysis
- security requirements
- network security
- network management
- security threats
- encryption scheme
- bidding strategies
- computer security
- information assurance
- key management
- elliptic curve
- authentication protocol
- malware detection
- multi unit
- neural network