Multiplicative Homomorphic E-Auction with Formally Provable Security.
Kun PengMatt HenricksenPublished in: WISTP (2013)
Keyphrases
- encryption scheme
- information security
- security requirements
- information assurance
- security issues
- network security
- access control
- intrusion detection
- cryptographic protocols
- statistical databases
- computer security
- security systems
- privacy preserving
- security policies
- online auctions
- security mechanisms
- data exchange
- cyber security
- security management
- data mining
- security analysis
- authentication protocol
- combinatorial auctions
- group buying