참고문헌
- P. Garcia, E. Gimenez, L. Godo, J. A. Rodriguez-Aguilar, "Bidding Strategies for Trading Agents in Auction-based Tournaments", in Agent Mediated Electronic Commerce(P. Noriega, C. Sierra, eds), pp.151-165, Springer, 1999.
- M. K. Franklin, M. K. Reiter, "Fair exchange with a semi-trusted third party", Proc. of the 4th ACM Conf. on Computer and Communication Security, pp.1-6, 1997.
- A. Asokan, V. Shoup, M. Waidner, "Asynchronous protocols for optimistic fair exchange", Proc. of the IEEE Symp. On Research in Security and Privac,, pp.86-99, 1998.
- M. Naor, B. Pinkas, and O. Reingold. "Privacy preserving auctions and mechanism design", Proc. 1st ACM Conference on Electronic Commerce, October 1999.
- M. K. Franklin, M. K. Reiter. "The design and implementation of secure auction server", IEEE Trans. On Software Engineering, Vol.22, No.5, pp.302-312, 1996. https://doi.org/10.1109/32.502223
- David Molnar, "Signing Electronic Contracts", ACM Crossroads. Available at http://www.acm.org/ crossroads/ xrds7-1/contract.html
- T. W. Sandholm, "Distributed Relation Decision Making", in Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence (G. Weiss, eds.), The MIT Press, pp.259-298, 1999.
- K. Omote, A. Miyaji, An Anonymous Sealed-bid Auction with a Feature of Enterntainment, Transaction of Information Processing Society of Japna, Vol.42, No.8, Aug. 2001.
- N. Prakobpol, Y. Permpoontanalarp, Multi-dimensional Hash Chain For Sealed-Bid Auction, Lecture Notes in Computer Science, Vol.2908, 2003.
- T. Okamoto, H. Yamamoto, Modern Cryptography, Industry Books, 1997.
- C. P. Pfleeger, Security in Computing, Prentice- Hall, 1997.
- W. Stallings, Cryptography and Network Security: Principle and Practice, Prentice-Hall, 1999.
- G. Weiss, Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence, The MIT Press, 1998.
- A. Juels and M.Szydlo. A Two-Server Sealed-Bid Auction Protocol,Proc.of Financial Cryptography 2002,2002.
- K. Suzuki, K. Kobayashi, H. Morita, Efficient Sealed-bid Auction Using Hash Chain, Proc. of 3rd International Conference on Information Security and Cryptology, pp.183-191, 2000.