Extensive research has been conducted in order to improve the security and efficiency of electronic auctions. However, little attention has been paid to the design issues. This paper discusses design issues and contrasts the differing security requirements between various auction types. We demonstrate that poor design for an electronic auction breaches the security of the system and degrades its practicality, irrespective of how secure/efficient the building blocks of an electronic auction are. This is accomplished by illustrating design flaws in several existing electronic auction schemes. Furthermore, we provide a solution to these flaws using a group signature scheme and give recommendations for sound auction design
ABSTRACT: The use of computing technology is a necessary but not sufficient approach to enhancing e-...
The most important issues in auction design are the traditional concerns of competition policy preve...
Auctions are a fundamental electronic commerce technology. We describe a set of protocols for perfor...
Extensive research has been conducted in order to improve the security and efficiency of electronic ...
this article we describe two popular types of electronic auctions. We discuss the security issues as...
Extensive research has been conducted in order to improve the security and efficiency of electronic ...
Auctioning items over the Internet is a popular and lucrative industry.There are now many companies ...
[[abstract]]—With the advances of network technology, electronic auctions have become increasingly p...
Online auctions are inherently insecure and there exist many opportunities for participants to cheat...
AbstractA new electronic auction scheme is proposed based on group signatures and partially blind si...
The evolution of the auction market has been on the upswing throughout the years as technology evolv...
Recently, a receipt-free scheme is rising for a secure e-auction. The goal of a receipt-free scheme ...
Enhancing e-commerce security through computing technology alone is not sufficient. E-commerce desig...
The most important issues in auction design are the traditional concerns of competition policy-preve...
With the rapid development of the Internet, electronic commerce has become more and more popular. As...
ABSTRACT: The use of computing technology is a necessary but not sufficient approach to enhancing e-...
The most important issues in auction design are the traditional concerns of competition policy preve...
Auctions are a fundamental electronic commerce technology. We describe a set of protocols for perfor...
Extensive research has been conducted in order to improve the security and efficiency of electronic ...
this article we describe two popular types of electronic auctions. We discuss the security issues as...
Extensive research has been conducted in order to improve the security and efficiency of electronic ...
Auctioning items over the Internet is a popular and lucrative industry.There are now many companies ...
[[abstract]]—With the advances of network technology, electronic auctions have become increasingly p...
Online auctions are inherently insecure and there exist many opportunities for participants to cheat...
AbstractA new electronic auction scheme is proposed based on group signatures and partially blind si...
The evolution of the auction market has been on the upswing throughout the years as technology evolv...
Recently, a receipt-free scheme is rising for a secure e-auction. The goal of a receipt-free scheme ...
Enhancing e-commerce security through computing technology alone is not sufficient. E-commerce desig...
The most important issues in auction design are the traditional concerns of competition policy-preve...
With the rapid development of the Internet, electronic commerce has become more and more popular. As...
ABSTRACT: The use of computing technology is a necessary but not sufficient approach to enhancing e-...
The most important issues in auction design are the traditional concerns of competition policy preve...
Auctions are a fundamental electronic commerce technology. We describe a set of protocols for perfor...