ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Secure Double Auction Protocols with Full Privacy Protection
Information Security and Cryptology - ICISC 2003 - Lecture Notes in Computer Science
◽
10.1007/978-3-540-24691-6_17
◽
2004
◽
pp. 215-229
◽
Cited By ~ 4
Author(s):
Changjie Wang
◽
Ho-fung Leung
◽
Yumin Wang
Keyword(s):
Privacy Protection
◽
Double Auction
Download Full-text
Related Documents
Cited By
References
A Privacy Protection Scheme of Microgrid Direct Electricity Transaction Based on Consortium Blockchain and Continuous Double Auction
IEEE Access
◽
10.1109/access.2019.2946794
◽
2019
◽
Vol 7
◽
pp. 151746-151753
◽
Cited By ~ 3
Author(s):
Shaomin Zhang
◽
Miao Pu
◽
Baoyi Wang
◽
Bin Dong
Keyword(s):
Privacy Protection
◽
Double Auction
◽
Protection Scheme
◽
Continuous Double Auction
Download Full-text
Proposal Tightens Privacy Protection
Internal Medicine News
◽
10.1016/s1097-8690(10)70711-3
◽
2010
◽
Vol 43
(13)
◽
pp. 77
Author(s):
MARY ELLEN SCHNEIDER
Keyword(s):
Privacy Protection
Download Full-text
A Genetic Network Programming-based Bidding Strategy with Adjusting Parameters for Large-scale Continuous Double Auction
IEEJ Transactions on Electronics Information and Systems
◽
10.1541/ieejeiss.133.388
◽
2013
◽
Vol 133
(2)
◽
pp. 388-397
Author(s):
Chuan Yue
◽
Shingo Mabu
◽
Kotaro Hirasawa
Keyword(s):
Large Scale
◽
Genetic Network
◽
Bidding Strategy
◽
Double Auction
◽
Network Programming
◽
Continuous Double Auction
◽
Genetic Network Programming
Download Full-text
Speech Privacy Protection based on Optimal Controlling Estimated Speech Transmission Index in Noisy Reverberant Environments
2020 28th European Signal Processing Conference (EUSIPCO)
◽
10.23919/eusipco47968.2020.9287627
◽
2021
◽
Author(s):
Suradej Duangpummet
◽
Phrimphissa Kraikhun
◽
Chatrin Phunruangsakao
◽
Jessada Karnjana
◽
Masashi Unoki
◽
...
Keyword(s):
Privacy Protection
◽
Transmission Index
◽
Reverberant Environments
◽
Speech Transmission
Download Full-text
Healthcare System with Intrusion Detection and Privacy Protection based Cloudlet
International Journal of Computer Sciences and Engineering
◽
10.26438/ijcse/v6i9.58
◽
2018
◽
Vol 6
(9)
◽
pp. 5-8
Author(s):
Kavita V. Dubey
◽
Vina M. Lomte
Keyword(s):
Intrusion Detection
◽
Healthcare System
◽
Privacy Protection
Download Full-text
Privacy Protection in Personalized Web Search using Obfuscation
International Journal of Emerging Trends in Engineering Research
◽
10.30534/ijeter/2020/76842020
◽
2020
◽
Vol 8
(4)
◽
pp. 1410-1416
Author(s):
Krishan Kumar
Keyword(s):
Privacy Protection
◽
Web Search
Download Full-text
Optimizing the Placement of Interconnected R&D Based on Double Auction
Экономика и математические методы
◽
10.31857/s042473880004026-7
◽
2019
◽
Vol 55
(1)
◽
pp. 32-42
Author(s):
A. Kozyrev
◽
Keyword(s):
Double Auction
Download Full-text
Multimedia security. Guideline for privacy protection of equipment and systems in and out of use
10.3403/30152269u
◽
2015
◽
Keyword(s):
Privacy Protection
◽
Multimedia Security
Download Full-text
Information security, cybersecurity and privacy protection. Governance of information security
10.3403/30389122
◽
2020
◽
Keyword(s):
Information Security
◽
Privacy Protection
Download Full-text
The Effects of Information Privacy Concerns and Perceived Severity of Private Information Damage on Use of Easy Payment Service - Focusing on Mediation Effect of Information Privacy Protection Behavior
Journal of Consumer Studies
◽
10.35736/jcs.30.6.11
◽
2019
◽
Vol 30
(6)
◽
pp. 251-270
Author(s):
Seong Lim Lee
◽
Xiaoxi Song
Keyword(s):
Private Information
◽
Privacy Protection
◽
Information Privacy
◽
Mediation Effect
◽
Privacy Concerns
◽
Perceived Severity
◽
Information Privacy Concerns
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close