Cryptographic protocols for Vickrey auctions
- 1 November 1993
- journal article
- Published by Springer Nature in Group Decision and Negotiation
- Vol. 2 (4) , 363-373
- https://doi.org/10.1007/bf01384489
Abstract
No abstract availableThis publication has 10 references indexed in Scilit:
- Why Are Vickrey Auctions Rare?Journal of Political Economy, 1990
- Public-Key CryptographyPublished by Springer Nature ,1990
- Computational Approaches to Bargaining and ChoiceJournal of Theoretical Politics, 1989
- Computation and AutomataPublished by Cambridge University Press (CUP) ,1985
- Collusion and the Choice of AuctionThe RAND Journal of Economics, 1985
- Protocols for secure computationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- State of the Art—Auctions and Bidding Models: A SurveyManagement Science, 1980
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- COUNTERSPECULATION, AUCTIONS, AND COMPETITIVE SEALED TENDERSThe Journal of Finance, 1961