2011 Second International Conference on Emerging Applications of Information Technology 2011
DOI: 10.1109/eait.2011.83
|View full text |Cite
|
Sign up to set email alerts
|

A New Secure Protocol for Multi-attribute Multi-round E-reverse Auction Using Online Trusted Third Party

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
21
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(23 citation statements)
references
References 10 publications
0
21
0
Order By: Relevance
“…The comparisons of the computation time of these protocols are shown in Figures , , and . Because did not provide strong privacy and public verifiability, the computation time of is much less than and the proposal. Because the proposal adopts hash function in place of public key, the computation time of proposal is much less than in the opening phase and the winner determination phase.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…The comparisons of the computation time of these protocols are shown in Figures , , and . Because did not provide strong privacy and public verifiability, the computation time of is much less than and the proposal. Because the proposal adopts hash function in place of public key, the computation time of proposal is much less than in the opening phase and the winner determination phase.…”
Section: Methodsmentioning
confidence: 99%
“…'s protocol. In addition, public verifiability cannot be provided . Later, Srinath et al .adopts Paillier cryptosystem and range protocol from Parkes et al .…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The bid privacy is weak in the protocol of Srinath et al . In addition, public verifiability cannot be provided . Later, Srinath et al .…”
Section: Introductionmentioning
confidence: 99%