Fraud detection system: A survey
The increment of computer technology use and the continued growth of companies have
enabled most financial transactions to be performed through the electronic commerce …
enabled most financial transactions to be performed through the electronic commerce …
Comprehensive survey on privacy-preserving protocols for sealed-bid auctions
R Alvarez, M Nojoumian - Computers & Security, 2020 - Elsevier
The internet is a ubiquitous technology that has changed conventional human interactions.
In our present time, it is not unusual for financial transactions to take place virtually with …
In our present time, it is not unusual for financial transactions to take place virtually with …
A tree structure-based improved blockchain framework for a secure online bidding system
The BlockChain (BC) is considered as one of the most exciting developments in information
and communication technology in the past decade and is widely known as a crypto intensive …
and communication technology in the past decade and is widely known as a crypto intensive …
SESA: An efficient searchable encryption scheme for auction in emerging smart grid marketing
Distributed energy resources (DERs), which are characterized by small‐scale power
generation technologies to provide an enhancement of the traditional power system, have …
generation technologies to provide an enhancement of the traditional power system, have …
Comparison of cryptographic verification tools dealing with algebraic properties
P Lafourcade, V Terrade, S Vigier - … on Formal Aspects in Security and …, 2009 - Springer
Recently Kuesters et al proposed two new methods using ProVerif for analyzing
cryptographic protocols with Exclusive-Or and Diffie-Hellman properties. Some tools, for …
cryptographic protocols with Exclusive-Or and Diffie-Hellman properties. Some tools, for …
Performance evaluations of cryptographic protocols verification tools dealing with algebraic properties
There exist several automatic verification tools of cryptographic protocols, but only few of
them are able to check protocols in presence of algebraic properties. Most of these tools are …
them are able to check protocols in presence of algebraic properties. Most of these tools are …
Secure e-auction system using blockchain: UAE case study
The emerging e-commerce systems open the way for several applications to be viable from
off-line to online system. E-Auction is an effective ecommerce system that allows bidders …
off-line to online system. E-Auction is an effective ecommerce system that allows bidders …
New sealed-bid electronic auction with fairness, security and efficiency
CC Wu, CC Chang, IC Lin - Journal of Computer Science and Technology, 2008 - Springer
Electronic sealed-bid auction schemes usually have a common drawback, the third party
(auction host) can conspire with a malicious bidder to leak all bidding prices before the …
(auction host) can conspire with a malicious bidder to leak all bidding prices before the …
Bidder-anonymous english auction scheme with privacy and public verifiability
YF Chung, KH Huang, HH Lee, F Lai… - Journal of Systems and …, 2008 - Elsevier
This work studies the English auction protocol, which comprises three interactive parties—
the Registration Manager, the Auction Manager and the Bidder. The registration manager …
the Registration Manager, the Auction Manager and the Bidder. The registration manager …
A novel electronic english auction system with a secure on-shelf mechanism
With the advances of network technology, electronic auctions have become increasingly
popular in recent years. In 2012, **ong proposed a bidder-anonymous auction scheme …
popular in recent years. In 2012, **ong proposed a bidder-anonymous auction scheme …