[1] 刘朝阳.大数据定价问题分析[J].图书情报知识,2016,0(1):57-64. LIU Zhaoyang.Analysis on pricing of big data[J].Document;Information& Knowledge,2016,0(1):57-64.(in Chinese)
[2] 王文平.大数据交易定价策略研究[J].软件,2016,37(10):94-97. WANG Wenping.Research on big data transaction pricing strategy[J].Computer Engineering & Software,2016,37(10):94-97.(in Chinese)
[3] 王继林,陈晓峰,王育民.一个安全的密封式电子拍卖方案[J].电子学报,2003,31(10):1578-1579. WANG Jilin,CHEN Xiaofeng,Wang Yumin.A secure sealed-bid electronic auction scheme[J].Acta Electronica Sinica,2003,31(10):1578-1579.(in Chinese)
[4] Parkes D C,Rabin M O,Shieber S M,et al.Practical secrecy-preserving,verifiably correct and trustworthy auctions[J].Electronic Commerce Research and Applications,2008,7(3):294-312.
[5] 王秀利,王萌.一种应用于双重数字签名的电子拍卖方案[J].计算机工程,2012,38(4):4-6. WANG Xiuli,WANG Meng.Electronic auction scheme applied for double digital signature[J].Computer Engineering,2012,38(4):4-6.(in Chinese)
[6] Rabin M O,Mansour Y,Muthukrishnan S,et al.Strictly-black-box zero-knowledge and efficient validation of financial transactions[A].International Colloquium on Automata,Languages,and Programming[C].Springer Berlin Heidelberg,2012:738-749.
[7] Rabin,M,Servedio,R,Thorpe,C.Practical secrecy preserving,verifiably correct and trustworthy auctions[A].Proceedings of IEEE Symposium on Logic in Computer Science[C].Wroclaw:IEEE,2007.
[8] Micali S,Rabin M O.Cryptography miracles,secure auctions,matching problem verification[J].Communications of the ACM,2014,57(2):85-93.
[9] Zhu Y,Liu L,Chen X.Efficient first-price sealed-bid auction protocols from modified comparable encryption[A].International Conference on Broadband and Wireless Computing,Communication and Applications(BWCCA)[C].Krakow:IEEE,2015.417-421.
[10] 丛鑫,訾玲玲,孙劲光.基于可信拍卖机制的视频移植定价策略[J].通信学报,2016,37(4):53-63. CONG Xin;ZI Lingling;SUN Jinguang.Pricing strategy for video migration based on truthful auction mechanism[J].Journal on Communications,2016,37(4):53-63.(in Chinese)
[11] 郭迟,刘经南,方媛,等.位置大数据的价值提取与协同挖掘方法[J].软件学报,2014,(04):713-730. GUO Chi,LIU Jingnan,FANG Yuan,et al.Value extraction and collaborative mining methods for location big data[J].Journal of Software,2014,(04):713-730.(in Chinese)
[12] Li J,Xu Z,Jiang Y,et al.The overview of big data storage and management[A].International Conference on Cognitive Informatics & Cognitive Computing(ICCI&CC)[C].London:IEEE,2014.510-513.
[13] 曹珍富,董晓蕾,周俊,等.大数据安全与隐私保护研究进展[J].计算机研究与发展,2016,(10):2137-2151. CAO Zhenfu,DONG Xiaolei,ZHOU Jun,et al.Research advances on big data security and privacy preserving[J].Journal of Computer Research and Development,2016,(10):2137-2151.(in Chinese)
[14] Niyato D,Alsheikh M A,Wang P,et al.Market model and optimal pricing scheme of big data and Internet of Things (IoT)[A].International Conference on Communications(ICC)[C].Kuala Lumpur:IEEE,2016.1-6.
[15] Li H,Dong M,Ota K,et al.Pricing and repurchasing for big data processing in multi-clouds[J].IEEE Transactions on Emerging Topics in Computing,2016,4(2):266-277.
[16] Merkle R C.Protocols for public key cryptosystems[A].IEEE 1th Symposium on Security & Privacy[C].Oakland:IEEE,1980.122-134.
[17] Schneider B.Applied Cryptography:Protocols,Algorithms,and Source Code in C[M].John Wiley & Sons,1996:84-84.
[18] Chaum D.Blind signature for untraceable Payments[A].Proc.Crypto'82[C].New York:Plenum Press,1983.199-203.
[19] 李顺东,戴一奇,游启友.姚氏百万富翁问题的高效解决方案[J].电子学报,2005,33(5):769-773. LI Shundong,DAI Yiqi,YOU Qiyou.An efficient solution to Yao's millionaire s'problem[J].Acta Electronica Sinica,2005,33(5):769-773.(in Chinese)
[20] Pedersen T P.Non-interactive and information-theoretic secure verifiable secret sharing[A].International Cryptology Conference on Advances in Cryptology[C].Springer Berlin Heidelberg,1991.129-140.
[21] Pedroso M A L.The implementation of a split-value verifiable voting system[D].Master's thesis,Massachusetts Institute of Technology,Department of Electrical Engineering and Computer Science,2015:11-21.
[22] Montenegro J A,Fischer M J,Lopez J,et al.Secure sealed-bid online auctions using discreet cryptographic proofs[J].Mathematical and Computer Modelling,2013,57(11):2583-2595.
[23] 曹刚.基于不可信第三方的电子拍卖方案[J].计算机工程,2010,36(20):140-141,144. CAO Gang.Electronic auction scheme based on trustless third-party[J].Computer Engineering,2010,36(20):140-141,144.(in Chinese)
[24] 张京良,马丽珍,王育民.可达到完全隐私的密封电子拍卖方案[J].通信学报,2007,28(11A):186-189. ZHANG Jingliang,MA Lizhen,WANG Yumin.Fully private sealed-bid auction scheme[J].Journal on Communications,2007,28(11A):186-189.(in Chinese) |