2007
DOI: 10.1504/ijeb.2007.014512
|View full text |Cite
|
Sign up to set email alerts
|

Secure and fair auctions over ad hoc networks

Abstract: The emergence of new mobile and wireless networks, with novel capabilities, offers opportunities to widen traditional internet-based applications. In this paper, we focus on a famous and widely used e-commerce application: auctions, and propose their deployment over ad hoc networks. Actually, we specify here this auction model while assuring identified crucial requirements: security and fairness. Security services are provided through threshold cryptography mechanisms whereas fairness is provided through round… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(12 citation statements)
references
References 9 publications
0
12
0
Order By: Relevance
“…In this way, convention, for example, 802.11 to convey by means of same recurrence or Bluetooth have required control utilization is specifically relative to the separation between single-jump transmissions [4]. To stay away from this steering issue, two hosts can utilize multi-bounce [34] transmission to convey through different has in the system A switch ought to give the capacity to rank directing data sources from most dependable to minimum reliable and to acknowledge steering data about a specific goal from the most reliable sources first.…”
Section: Figure 1 Network Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…In this way, convention, for example, 802.11 to convey by means of same recurrence or Bluetooth have required control utilization is specifically relative to the separation between single-jump transmissions [4]. To stay away from this steering issue, two hosts can utilize multi-bounce [34] transmission to convey through different has in the system A switch ought to give the capacity to rank directing data sources from most dependable to minimum reliable and to acknowledge steering data about a specific goal from the most reliable sources first.…”
Section: Figure 1 Network Modelmentioning
confidence: 99%
“…The coordinating thought basically incorporates, two activities: immediately, choosing perfect controlling ways and moreover, trading the information social occasionsthrough an internetwork. The later thought is called as bundle trading which is straight forward, and the way confirmation could be amazingly complex [4]. Guiding traditions use a couple of estimations to figure the most ideal approach to defeat the groups to its objective.…”
Section: Routingmentioning
confidence: 99%
See 2 more Smart Citations
“…This latter performs various functionalities and can implement multiple auction-related policies. The model of P2P auction over ad hoc networks [4] bears a resemblance to P2P networking model of ad hoc networks. Hence, we propose new communication architecture, called WAHS (Wireless Auction Handling System), to support P2P auctions over mobile ad hoc networks.…”
Section: The Architecturementioning
confidence: 99%