Next: About this document
Up: SAM: A Flexible and
Previous: Conclusions and Future Work
References
- 1
-
www.auctioninsider.com/every.html.
List of almost a hundred on-line auction houses.
- 2
-
Proceedings of the IEEE Symposium on Research in Security and Privacy,
Oakland, CA, April 1987. IEEE Computer Society Press.
- 3
-
N. Asokan, Matthias Schunter, and Michael Waidner.
Optimistic protocols for fair exchange.
In Proc. 4th ACM Conference on Computer and Communications
Security, pages 6, 8-17, 1997.
- 4
-
Doneel Edelson.
13-year-old makes 3m dollars in bids on ebay.
The Risks Digest, April 30 1999.
- 5
-
Matthew Franklin and Michael Reiter.
The design and implementation of a secure auction service.
IEEE Transactions on Software Engineering, 22(5):302-312, May
1996.
- 6
-
M. Harkavy, J.D. Tygar, and H. Kikuchi.
Electronic auctions with private bids.
In Proceeding of 3rd USENIX Workshop on Electronic Commerce,
1998.
- 7
-
R.P. McAfee and J. McMillan.
Auctions and bidding.
Journal of Economic Literature, 1987.
- 8
-
Paul Milgrom.
Auction Theory.
Cambridge University Press, 1985.
- 9
-
T. Mullen and M.P. Wellman.
The auction manager: Market middleware for large-scale electronic
commerce.
In Proceeding of 3rd USENIX Workshop on Electronic Commerce,
1998.
- 10
-
Moni Naor, Benny Pinkas, and Omer Reingold.
Privacy preserving auctions and mechanism design.
In Proc. 1st ACM Conference on Electronic Commerce, October
1999.
- 11
-
S. J. Rassenti, V. L. Smith, and R. L. Bulfin.
A combinatorial auction mechanism for airport time slot allocation,
1982.
- 12
-
P. Sanders, S. Rhodes, and A. Patel.
Auctioning by satellite using trusted third party security services.
11th IFIP conference on information security, 1995.
- 13
-
S. W. Smith.
Secure Distributed Time for Secure Distributed Protocols.
PhD thesis, Carnegie Mellon University, 1994.
- 14
-
S. W. Smith.
Webalps: Using trusted co-servers to enhance privacy and security of
web transactions.
Technical Report IBM Research Report RC-21851, IBM T.J. Watson
Research Center, October 2000.
- 15
-
S.W. Smith, D.B. Johnson, and J.D. Tygar.
Completely asynchronous optimistic recovery with minimal rollbacks.
In 25th International Symposium on Fault-Tolerant Computing,
1995.
- 16
-
S.W. Smith, R. Perez, S.H. Weingart, and V. Austel.
Validating a high-performance, programmable secure coprocessor.
In 22nd National Information Systems Security Conference,
October 1999.
- 17
-
S.W. Smith and S.H. Weingart.
Building a high-performance, programmable secure coprocessor.
Computer Networks (Special Issue on Computer Network Security),
31:831-960, 1999.
- 18
-
S. Stubblebine and P. Syverson.
Fair on-line auctions without special trusted parties.
In Financial Cryptography'99, 1999.
- 19
-
J. D. Tygar.
Atomicity in electronic commerce.
In Proc. 15th ACM Symposium on Principles of Distributed
Computing (PODC), pages 8-26, 1996.
- 20
-
Hal Varian.
Mechanism design for computerized agents.
In Usenix Workshop on Electronic Commerce, July 11-12, 1995, New
York, New York, July 1995.
- 21
-
S.H. Weingart.
Physical security for the microabyss system.
In Proceedings of the IEEE Symposium on Research in Security
and Privacy [2].
- 22
-
S.R. White and L. Comerford.
Abyss: A trusted architecture for software protection.
In Proceedings of the IEEE Symposium on Research in Security
and Privacy [2].
- 23
-
P.R. Wurman, W.E. Walsh, and M.P. Wellman.
Flexible double auctions for electronic commerce: Theory and
implementation.
Decision Support Systems, to appear.
- 24
-
Bennet Yee and Doug Tygar.
Secure coprocessors in electronic commerce applications.
In Proceedings of The First USENIX Workshop on Electronic
Commerce, New York, New York, July 1995.
- 25
-
Bennet S. Yee.
Using Secure Coprocessors.
PhD thesis, Carnegie Mellon University, 1994.
Next: About this document
Up: SAM: A Flexible and
Previous: Conclusions and Future Work
Adrian Perrig
Tue Jan 23 20:35:17 PST 2001