References
- D. Hirakiuchi and K. Sakurait, "English vs. Sealed Bid in Anonymous Electronic Auction Protocols," in Proc. of IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 171-176, 2001.
- C.C. Chang and Y.F. Chang, "Efficient Anonymous Auction Protocols with Freewheeling Bids," Computers & Security, Vol. 22, No. 8, pp. 728-734, 2003. https://doi.org/10.1016/S0167-4048(03)00013-0
- R. Jiang, L. Pan and J. H. Li, "An Improvement on Efficient Anonymous Auction Protocols," Computers & Security, Vol. 24, No. 2, pp. 169-174, 2005. https://doi.org/10.1016/j.cose.2004.09.010
- Y.F. Chang and C.C. Chang, "Enhanced Anonymous Auction Protocols with Freewheeling Bids," in Proc. of 20th International Conference on Advanced Information Networking and Application, Vol. 1, pp. 353-358, 2006.
- H.T. Liaw, W.S. Juang and C.K. Lin, "An Electronic Online Bidding Auction Protocol with both Security and Efficiency," Applied Mathematics and Computation, Vol. 174, No. 2, pp. 1487- 1497, 2006. https://doi.org/10.1016/j.amc.2005.06.016
- Y.F. Chung, K.H. Huang, H.H. Lee, F.P. Lai and T.S. Chen, "Bidder-anonymous English Auction Scheme with Privacy and Public Verifiability," Journal of Systems and Software, Vol. 81, No. 1, pp. 113-119, 2008. https://doi.org/10.1016/j.jss.2007.03.029
- Y.F. Chung, Y.T. Chen, T.L. Chen and T.S. Chen, "An Agent-based English Auction Protocol using Elliptic Curve Cryptosystem for Mobile Commerce," Expert Systems with Applications, Vol. 38, No. 8, pp. 9900-9907, 2011. https://doi.org/10.1016/j.eswa.2011.02.039
- H. Xiong, Z. Chen and F. Li, "Bidder-anonymous English Auction Protocol based on Revocable Ring Signature," Expert Systems with Applications, Vol. 39, No. 8, pp. 7062-7066, 2012. https://doi.org/10.1016/j.eswa.2012.01.040
- J.Heezen and W. Beats, "The Impact of Electronic Markets: The Case of the Dutch Flower Auction," Journal of Strategic Information System, Vol. 5, No. 4, pp. 317-333, 1996. https://doi.org/10.1016/S0963-8687(96)80032-1
- W. Standaert, S. Muylle and I. Amelinckx, "An Empirical Study of Electronic Reverse Auction Project Outcomes," Electronic Commerce Research and Applications, Vol.14, No. 2, pp. 81-94, 2015. https://doi.org/10.1016/j.elerap.2014.12.001
- C.C. Wu, C.C. Chang and I.C. Lin, "New Sealed-bid Electronic Auction with Fairness, Security and Efficiency," Journal of Computer Science and Technology, Vol. 23, No. 2, pp. 253-264, 2008. https://doi.org/10.1007/s11390-008-9127-x
- M.J. Li, J. S.T. Juan and J. H.C. Tsai, "Practical Electronic Auction Scheme with Strong Anonymity and Bidding Privacy," Information Sciences, Vol. 181, No. 12, pp. 2576-2586, 2011. https://doi.org/10.1016/j.ins.2011.02.005
- W. Shi, "An Efficient Sealed-bid Auction Protocol with Bid Privacy and Bidder Privacy," International Journal of Innovative Computing, Information and Control, Vol. 8, No. 11, pp. 7943- 7953, 2012.
- W.S. Juang, H.T. Liaw, P.C. Lin and C.K. Lin, "The Design of a Secure and Fair Sealed-bid Auction Service," Mathematical and Computer Modelling, Vol. 41, No. 8-9, pp. 973-985, 2005. https://doi.org/10.1016/j.mcm.2004.05.008
- K. Miyashita, "Online Double Auction Mechanism for Perishable Goods," Electronic Commerce Research and Applications, Vol.13, No. 5, pp. 355-367, 2015. https://doi.org/10.1016/j.elerap.2014.06.004
- L. I. de Castro and D. H. Karney, "Equilibria Existence and Characterization in Auctions: Achievements and Open Questions," Journal of Economic Surveys, Vol. 26, No. 5, pp. 911-932, 2012. https://doi.org/10.1111/j.1467-6419.2011.00680.x
- C.C. Lina, S.C. Chenb and Y.M. Chu, "Automatic Price Negotiation on The Web: An Agentbased Web Application using Fuzzy Expert System," Expert Systems with Applications, Vol. 38, No. 5, pp. 5090-5100, 2011. https://doi.org/10.1016/j.eswa.2010.09.142
- A. H. Ozer and C. Ozturan, "Multi-unit Differential Auction-barter Model for Electronic Marketplaces," Electronic Commerce Research and Applications, Vol. 10, pp. 132-143, 2011. https://doi.org/10.1016/j.elerap.2010.03.002
- J.S. Chang and W.H. Chang, "Analysis of Fraudulent Behavior Strategies in Online Auctions for Detecting Latent Fraudsters," Electronic Commerce Research and Applications, Vol.13, No. 2, pp. 79-97, 2015. https://doi.org/10.1016/j.elerap.2013.10.004
- F.S. Hsieh and C.S. Liao, "Schemes to Reward Winners in Combinational Double Auctions based on Optimization of Surplus," Electronic Commerce Research and Applications, Vol.14, No. 6, pp. 405-417, 2015. https://doi.org/10.1016/j.elerap.2015.05.002
- C. Dang, Q. Hu and J. Liu, "Bidding Strategies in Online Auctions with Different Ending Rules and Value," Electronic Commerce Research and Applications, Vol.14, No. 2, pp. 104-111, 2015. https://doi.org/10.1016/j.elerap.2014.12.002
- X. Li, J. Mab, W. Wang, Y. Xiong and J. Zhang, "A Novel Smart Card and Dynamic ID based Remote User Authentication Scheme for Multi-server Environments," Mathematical and Computer Modelling, Vol. 58, No. 1-2, pp. 85-95, 2012. https://doi.org/10.1016/j.mcm.2012.06.033
- D. Chaum and H. Antwerpen, "Undeniable Signatures," Advances in Cryptology. CRYPTO'89, Vol. 435, pp. 212-216, 1990.
- C.P. Schnorr, "Efficient Signature Generation for Smart Cards," Journal of Cryptology, Vol. 4, No. 3, pp. 239-252, 1991.
- J. Daemen and V. Rijmen, "The Design of Rijndael: AES - The Advanced Encryption Standard," Springer, 2002.
- A. Menezes, P. V. Oorschot and S. Vanstone, "Handbook of Applied Cryptography," CRC Press, USA, pp. 321-376, 1996.
- M. Burrows, M. Abadi and R. Needham, "Authentication: A Practical Study in Belief and Action," in Proc. of 2nd Conference on Theoretical Aspects of Reasoning about Knowledge, CA, USA, pp. 325-342, 1988.
- M. Burrows, M. Abadi and R. Needham, "A Logic of Authentication," ACM Transactions on Computer Systems, Vol. 8, No. 1, pp. 18-36, 1990. https://doi.org/10.1145/77648.77649
- S.P. Yang and X. Li, "Defect in Protocol Analysis with BAN Logic on Man-in-the-middle Attacks," Application Research of Computers, Vol. 24, pp. 149-151, 2007.
- B. Schneier, "Applied Cryptography, Protocols Algorithms, and Source Code in C," John Wiley and Sons Inc., New York, U.S.A., 1994.