Secure Double Auction Protocols with Full Privacy Protection.
Changjie WangHo-fung LeungYumin WangPublished in: ICISC (2003)
Keyphrases
- privacy protection
- mutual authentication
- double auction
- trusted third party
- software agents
- sensitive data
- data sharing
- privacy preserving
- security protocols
- sensitive information
- information loss
- mechanism design
- data collection
- authentication protocol
- data protection
- key distribution
- security services
- bidding strategies
- private information
- agent oriented
- market share
- learning agents
- statistical databases
- digital signature
- information sharing
- secret key
- security analysis
- key management
- credit card
- authentication scheme
- smart card
- privacy preserving data mining