|
[1] Vijay Krishna. “Auction theory,” Academic press, 2009. [2] “eBay,” http://www.ebay.com/ [3] “Yahoo 拍賣,” https://tw.bid.yahoo.com/ [4] “蘇富比,” http://www.sothebys.com/ [5] “BID Now,” http://www.sothebys.com/en/auctions/watch-live.html [6] Leslie Lamport. “Password authentication with insecure communication,” Communications of the ACM 24.11 (1981): 770-772. [7] “RFC 791,” https://tools.ietf.org/html/rfc791 [8] Jianying Zhou, and Dieter Gollman. “A fair non-repudiation protocol,” IEEE, 1996. [9] Stuart G. Stubblebine and Paul F. Syverson. “Fair on-line auctions without special trusted parties,” Financial Cryptography. Springer Berlin Heidelberg, 1999. [10] Nicolás González-Deleito and Olivier Markowitch. “An optimistic multi-party fair exchange protocol with reduced trust requirements,” International Conference on Information Security and Cryptology. Springer Berlin Heidelberg, 2001. [11] Kazumasa Omote and Atsuko Miyaji. “A practical English auction with one-time registration,” Information Security and Privacy. Springer Berlin Heidelberg, 2001. [12] Byoungcheon Lee, Kwangjo Kim, and Joongsoo Ma. “Efficient public auction with one-time registration and public verifiability,” Progress in Cryptology—INDOCRYPT 2001. Springer Berlin Heidelberg, 2001. 162-174. [13] Tzer-Shyong Chen. “An English auction scheme in the online transaction environment,” Computers & Security 23.5 (2004): 389-399. [14] Mamata Jenamani, Yuhui Zhong, and Bharat Bhargava. “Cheating in online auction–Towards explaining the popularity of English auction,” Electronic Commerce Research and Applications 6.1 (2007): 53-62. [15] Yu Fang Chung, Kuo Hsuan Huang, Hsiu Hui Lee, Feipei Lai, and Tzer Shyong Chen. “Bidder-anonymous English auction scheme with privacy and public verifiability,” Journal of Systems and Software 81.1 (2008): 113-119. [16] Yu-Fang Chung, Yu-Ting Chen, Tzer-Long Chen, and Tzer-Shyong Chen. “An agent-based English auction protocol using Elliptic Curve Cryptosystem for mobile commerce,” Expert Systems with Applications 38.8 (2011): 9900-9907. [17] Hu Xiong, Zhong Chen, and Fagen Li. “Bidder-anonymous English auction protocol based on revocable ring signature,” Expert Systems with Applications 39.8 (2012): 7062-7066. [18] Chin-Chen Chang, Ting-Fang Cheng, and Wei-Yi Chen. “A novel electronic English auction system with a secure on-shelf mechanism,” Information Forensics and Security, IEEE Transactions on 8.4 (2013): 657-668. [19] Tzong-Chen Wu, Tzuoh-Yi Lin, Tzong-Sun Wu, and Han-Yu Lin. “Efficient English auction scheme without a secure channel,” Int. Arab J. Inf. Technol. 12.3 (2015): 246-252. [20] Gwan-Hwan Hwang, Yi-Ling Yuan, and Chi Wu-Lee. “Cryptographic Accountability for Service-Oriented-Architecture Systems,” IEEE Transactions on Service Computing (2016) (In Revision) [21] “JSON Web Token,” https://jwt.io/ [22] “Hop,” https://en.wikipedia.org/wiki/Hop_(networking) [23] “POSIX,” https://en.wikipedia.org/wiki/POSIX [24] “Amazon EC2,” https://aws.amazon.com/tw/ec2/
|