How to obtain full privacy in auctions (Q5492128): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s10207-006-0001-y / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1984808769 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3043931 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4739528 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computer Aided Verification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Financial Cryptography and Data Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4940695 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order / rank
 
Normal rank
Property / cites work
 
Property / cites work: A public key cryptosystem and a signature scheme based on discrete logarithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: How To Prove Yourself: Practical Solutions to Identification and Signature Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4418550 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4279565 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4437112 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Financial Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2707412 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Two-Server, Sealed-Bid Auction Protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3043933 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computer Aided Verification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4739527 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Vickrey Auctions without Threshold Trust / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bounded-concurrent secure multi-party computation with a dishonest majority / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035712 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434870 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4950062 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient signature generation by smart cards / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computer Aided Verification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3840086 / rank
 
Normal rank

Latest revision as of 21:43, 24 June 2024

scientific article; zbMATH DE number 5063469
Language Label Description Also known as
English
How to obtain full privacy in auctions
scientific article; zbMATH DE number 5063469

    Statements

    How to obtain full privacy in auctions (English)
    0 references
    0 references
    13 October 2006
    0 references
    0 references
    auctions
    0 references
    cryptographic protocols
    0 references
    homomorphic encryption
    0 references
    0 references