|
| | | |
Five Sealed-bid Auction Models
Peng, K., Boyd, C., Dawson, E. and Viswanathan, K.
Published sealed-bid auction schemes are classified into four models according to how they deal with bid privacy. The properties of each model are introduced and possible improvements in these models are suggested. A new model is proposed and its implementation is discussed. Application of different models is discussed, based on a comparison of the models. |
Cite as: Peng, K., Boyd, C., Dawson, E. and Viswanathan, K. (2003). Five Sealed-bid Auction Models. In Proc. First Australasian Information Security Workshop (AISW2003), Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds. ACS. 77-86. |
(from crpit.com)
(local if available)
|
|