Secure Vickrey Auctions without a Trusted Third Party.
Bart De DeckerGregory NevenFrank PiessensPublished in: SEC (2003)
Keyphrases
- trusted third party
- combinatorial auctions
- mechanism design
- third party
- auction mechanisms
- digital signature
- credit card
- security services
- authentication protocol
- privacy protection
- single point of failure
- resource allocation
- multi party non repudiation
- bidding strategies
- multi attribute
- key distribution
- data mining
- fault tolerant
- data access
- mobile devices
- database