Sciweavers

116 search results - page 1 / 24
» Selling Privacy at Auction
Sort
View
CORR
2010
Springer
156views Education» more  CORR 2010»
13 years 4 months ago
Selling Privacy at Auction
We initiate the study of markets for private data, through the lens of differential privacy. Although the purchase and sale of private data has already begun on a large scale, a t...
Arpita Ghosh, Aaron Roth
IJISEC
2006
108views more  IJISEC 2006»
13 years 4 months ago
How to obtain full privacy in auctions
Abstract Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols t...
Felix Brandt
WECWIS
2005
IEEE
93views ECommerce» more  WECWIS 2005»
13 years 10 months ago
A Novel Auction Mechanism for Selling Time-Sensitive E-Services
Many e-services are time-sensitive as the users request them for a specific time period. Such services need to be repeatedly offered to keep them constantly utilized. This paper s...
Juong-Sik Lee, Boleslaw K. Szymanski
FC
2003
Springer
101views Cryptology» more  FC 2003»
13 years 10 months ago
Fully Private Auctions in a Constant Number of Rounds
Abstract. We present a new cryptographic auction protocol that prevents extraction of bid information despite any collusion of participants. This requirement is stronger than commo...
Felix Brandt
COCOON
2007
Springer
13 years 11 months ago
Properties of Symmetric Incentive Compatible Auctions
We formalize the definition of symmetric auctions to study fundamental properties of incentive compatible auction protocols. We characterize such auction protocols for those with ...
Xiaotie Deng, Kazuo Iwama, Qi Qi, Aries Wei Sun, T...