next up previous
Next: About this document Up: SAM: A Flexible and Previous: Conclusions and Future Work

References

1
www.auctioninsider.com/every.html. List of almost a hundred on-line auction houses.

2
Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, April 1987. IEEE Computer Society Press.

3
N. Asokan, Matthias Schunter, and Michael Waidner. Optimistic protocols for fair exchange. In Proc. 4th ACM Conference on Computer and Communications Security, pages 6, 8-17, 1997.

4
Doneel Edelson. 13-year-old makes 3m dollars in bids on ebay. The Risks Digest, April 30 1999.

5
Matthew Franklin and Michael Reiter. The design and implementation of a secure auction service. IEEE Transactions on Software Engineering, 22(5):302-312, May 1996.

6
M. Harkavy, J.D. Tygar, and H. Kikuchi. Electronic auctions with private bids. In Proceeding of 3rd USENIX Workshop on Electronic Commerce, 1998.

7
R.P. McAfee and J. McMillan. Auctions and bidding. Journal of Economic Literature, 1987.

8
Paul Milgrom. Auction Theory. Cambridge University Press, 1985.

9
T. Mullen and M.P. Wellman. The auction manager: Market middleware for large-scale electronic commerce. In Proceeding of 3rd USENIX Workshop on Electronic Commerce, 1998.

10
Moni Naor, Benny Pinkas, and Omer Reingold. Privacy preserving auctions and mechanism design. In Proc. 1st ACM Conference on Electronic Commerce, October 1999.

11
S. J. Rassenti, V. L. Smith, and R. L. Bulfin. A combinatorial auction mechanism for airport time slot allocation, 1982.

12
P. Sanders, S. Rhodes, and A. Patel. Auctioning by satellite using trusted third party security services. 11th IFIP conference on information security, 1995.

13
S. W. Smith. Secure Distributed Time for Secure Distributed Protocols. PhD thesis, Carnegie Mellon University, 1994.

14
S. W. Smith. Webalps: Using trusted co-servers to enhance privacy and security of web transactions. Technical Report IBM Research Report RC-21851, IBM T.J. Watson Research Center, October 2000.

15
S.W. Smith, D.B. Johnson, and J.D. Tygar. Completely asynchronous optimistic recovery with minimal rollbacks. In 25th International Symposium on Fault-Tolerant Computing, 1995.

16
S.W. Smith, R. Perez, S.H. Weingart, and V. Austel. Validating a high-performance, programmable secure coprocessor. In 22nd National Information Systems Security Conference, October 1999.

17
S.W. Smith and S.H. Weingart. Building a high-performance, programmable secure coprocessor. Computer Networks (Special Issue on Computer Network Security), 31:831-960, 1999.

18
S. Stubblebine and P. Syverson. Fair on-line auctions without special trusted parties. In Financial Cryptography'99, 1999.

19
J. D. Tygar. Atomicity in electronic commerce. In Proc. 15th ACM Symposium on Principles of Distributed Computing (PODC), pages 8-26, 1996.

20
Hal Varian. Mechanism design for computerized agents. In Usenix Workshop on Electronic Commerce, July 11-12, 1995, New York, New York, July 1995.

21
S.H. Weingart. Physical security for the microabyss system. In Proceedings of the IEEE Symposium on Research in Security and Privacy [2].

22
S.R. White and L. Comerford. Abyss: A trusted architecture for software protection. In Proceedings of the IEEE Symposium on Research in Security and Privacy [2].

23
P.R. Wurman, W.E. Walsh, and M.P. Wellman. Flexible double auctions for electronic commerce: Theory and implementation. Decision Support Systems, to appear.

24
Bennet Yee and Doug Tygar. Secure coprocessors in electronic commerce applications. In Proceedings of The First USENIX Workshop on Electronic Commerce, New York, New York, July 1995.

25
Bennet S. Yee. Using Secure Coprocessors. PhD thesis, Carnegie Mellon University, 1994.


next up previous
Next: About this document Up: SAM: A Flexible and Previous: Conclusions and Future Work

Adrian Perrig
Tue Jan 23 20:35:17 PST 2001