In this paper we present a cryptographic protocol which is the realization of an electronic auction being the component of the e-government system. This cryptographic protocol fulfils all the functions of the classic auction and additionally, by use of cryptographic primitives, enhances the protection of information. The characteristic features of the protocol are: the incontrovertibility of participants and offers, data integrity, confidence of bids, anonymity of the winning bidder, public verification of the result of auction and confirmation of taking part in the auction
The evolution of the auction market has been on the upswing throughout the years as technology evo...
Abstract. An auction is a simple way of selling and buying goods. Modern auc-tion protocols often re...
Auctions are a fundamental electronic commerce technology. We describe a set of protocols for perfor...
In the article we show an attack on the cryptographic protocol of electronic auction withextended re...
An auction is a simple way of selling and buying goods. Modern auction protocols often rely on compl...
A secure protocol for electronic, sealed-bid, single item auctions is presented. The protocol caters...
International audienceAuctions have a long history, having been recorded as early as 500 B.C.. With ...
A secure protocol for electronic, sealed-bid, single item auctions is presented. The protocol caters...
International audienceAn auction is a simple way of selling and buying goods. Modern auction protoco...
Online auctions are inherently insecure and there exist many opportunities for participants to cheat...
One of the main components of public key infrastructure (PKI) is the center of certification. The fu...
Auctions have become an important part of electronic commerce. Considering the gradually increasing ...
Auction is one of the methods assigning something such as goods or works to two or more people, call...
Auctioning items over the Internet is a popular and lucrative industry.There are now many companies ...
International audienceIn the article we show an attack on the cryptographic protocol of electronic a...
The evolution of the auction market has been on the upswing throughout the years as technology evo...
Abstract. An auction is a simple way of selling and buying goods. Modern auc-tion protocols often re...
Auctions are a fundamental electronic commerce technology. We describe a set of protocols for perfor...
In the article we show an attack on the cryptographic protocol of electronic auction withextended re...
An auction is a simple way of selling and buying goods. Modern auction protocols often rely on compl...
A secure protocol for electronic, sealed-bid, single item auctions is presented. The protocol caters...
International audienceAuctions have a long history, having been recorded as early as 500 B.C.. With ...
A secure protocol for electronic, sealed-bid, single item auctions is presented. The protocol caters...
International audienceAn auction is a simple way of selling and buying goods. Modern auction protoco...
Online auctions are inherently insecure and there exist many opportunities for participants to cheat...
One of the main components of public key infrastructure (PKI) is the center of certification. The fu...
Auctions have become an important part of electronic commerce. Considering the gradually increasing ...
Auction is one of the methods assigning something such as goods or works to two or more people, call...
Auctioning items over the Internet is a popular and lucrative industry.There are now many companies ...
International audienceIn the article we show an attack on the cryptographic protocol of electronic a...
The evolution of the auction market has been on the upswing throughout the years as technology evo...
Abstract. An auction is a simple way of selling and buying goods. Modern auc-tion protocols often re...
Auctions are a fundamental electronic commerce technology. We describe a set of protocols for perfor...