[1] |
AL-KINANI A , WANG C X , ZHOU L ,et al. Optical wireless communication channel measurements and models[J]. IEEE Communications Surveys & Tutorials, 2018,20(3): 1939-1962.
|
[2] |
CHOWDHURY M Z , HASAN M K , SHAHJALAL M ,et al. Opportunities of optical spectrum for future wireless communications[C]// 2019 International Conference on Artificial Intelligence in Information and Communication. Piscataway:IEEE Press, 2019: 4-7.
|
[3] |
ZHAO F , TANG Q . A KNN learning algorithm for collusion-resistant spectrum auction in small cell networks[J]. IEEE Access, 2018,6: 45796-45803.
|
[4] |
YADAV I , KULKARNI A A , KARANDIKAR A . Strategy-proof spectrum allocation among multiple operators[C]// 2019 IEEE Wireless Communications and Networking Conference. Piscataway:IEEE Press, 2019: 1-6.
|
[5] |
万屹 . 全球首次频谱资源激励拍卖带给我们的启示[J]. 中国无线电, 2017(11): 37-38.
|
|
WAN Y . Enlightenment from the world’s first spectrum resource incentive auction[J]. China Radio, 2017(11): 37-38.
|
[6] |
余莉娟 . 激励拍卖:利用市场手段加速频谱转让的新手段[J]. 世界电信, 2015(12): 50-53.
|
|
YU L J . Incentive auction:new means to use market to accelerate spectrum transfers[J]. World Telecommunications, 2015(12): 50-53.
|
[7] |
TEICH J E , WALLENIUS H , WALLENIUS J ,et al. A multi-attribute e-auction mechanism for procurement:Theoretical foundations[J]. European Journal of Operational Research, 2006,175(1): 90-100.
|
[8] |
GOLDREICH O . On the foundations of cryptography[M]. NewYork: ACM BooksPress, 2019: 411-496.
|
[9] |
BRICKELL J , SHMATIKOV V . Privacy-preserving graph algorithms in the semi-honest model[C]// International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2005: 236-252.
|
[10] |
FOUQUE P A , POUPARD G , STERN J . Sharing decryption in the context of voting or lotteries[C]// International Conference on Financial Cryptography. Berlin:Springer, 2000: 90-104.
|
[11] |
PAILLIER P , . Public-key cryptosystems based on composite degree residuosity classes[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 1999: 223-238.
|
[12] |
SHOUP V , . Practical threshold signatures[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2000: 207-220.
|
[13] |
BEIL D R , WEIN L M . An inverse-optimization-based auction mechanism to support a multiattribute RFQ process[J]. Management Science, 2003,49(11): 1529-1545.
|
[14] |
SCHARTNER P , SCHAFFER M . Unique user-generated digital pseudonyms[C]// International Workshop on Mathematical Methods,Models,and Architectures for Computer Network Security. Berlin:Springer, 2005: 194-205.
|
[15] |
TZENG W G . Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters[J]. IEEE Transactions on Computers, 2004,53(2): 232-240.
|
[16] |
BAUDRON O , FOUQUE P A , POINTCHEVAL D ,et al. Practical multi-candidate election system[C]// Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing. New York:ACM Press, 2001: 274-283.
|
[17] |
DAMG?RD I , JURIK M . A generalisation,a simplication and some applications of paillier’s probabilistic public-key system[C]// International Workshop on Public Key Cryptography. Berlin:Springer, 2001: 119-136.
|
[18] |
FIAT A , SHAMIR A . How to prove yourself:practical solutions to identification and signature problems[C]// Conference on the Theory and Application of Cryptographic Techniques. Berlin:Springer, 1986: 186-194.
|
[19] |
PAN M , SUN J , FANG Y . Purging the back-room dealing:secure spectrum auction leveraging paillier cryptosystem[J]. IEEE Journal on Selected Areas in Communications, 2011,29(4): 866-876.
|
[20] |
HUANG Q , TAO Y , WU F . Spring:a strategy-proof and privacy preserving spectrum auction mechanism[C]// 2013 Proceedings IEEE INFOCOM. Piscataway:IEEE Press, 2013: 827-835.
|
[21] |
WU F , HUANG Q , TAO Y ,et al. Towards privacy preservation in strategy-proof spectrum auction mechanisms for noncooperative wireless networks[J]. IEEE/ACM Transactions on Networking, 2014,23(4): 1271-1285.
|
[22] |
HUANG H , LI X Y , SUN Y ,et al. PPS:privacy-preserving strategyproof social-efficient spectrum auction mechanisms[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,26(5): 1393-1404.
|
[23] |
CHEN Z , CHEN L , HUANG L ,et al. Towards secure spectrum auction:both bids and bidder locations matter:poster[C]// Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing. New York:ACM Press, 2016: 361-362.
|
[24] |
SRINATH T R , SINGH M P , PAIS A R . Anonymity and verifiability in multi-attribute reverse auction[J]. arXiv Preprint,arXiv:1109.0359, 2011
|
[25] |
SRINATH T R , KELLA S , JENAMANI M ,et al. A new secure protocol for multi-attribute multi-round e-reverse auction using online trusted third party[C]// International Conference on Emerging Applications of Information Technology. Piscataway:IEEE Press, 2011: 149-152.
|
[26] |
NJAH H , JAMOUSSI S , MAHDI W . Deep Bayesian network architecture for big data mining[J]. Concurrency and Computation:Practice and Experience, 2019,31(2):e4418.
|
[27] |
WANG J , KARUPPIAH M , KUMARI S ,et al. A privacy-preserving spectrum auction scheme using paillier cryptosystem with public verification[J]. Journal of Intelligent & Fuzzy Systems, 2019,doi:10.3233/JIFS-169979.
|
[28] |
WANG S G , XU P , XU X H ,et al. TODA:truthful online double auction for spectrum allocation in wireless networks[C]// 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum. Piscataway:IEEE Press, 2010: 1-10.
|
[29] |
CHEN Z , HUANG L , LI L ,et al. PS-TRUST:provably secure solution for truthful double spectrum auctions[C]// IEEE INFOCOM 2014-IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2014: 1249-1257.
|
[30] |
CHEN Z , WEI X , ZHONG H ,et al. Secure,efficient and practical double spectrum auction[C]// 2017 IEEE/ACM 25th International Symposium on Quality of Service. Piscataway:IEEE Press, 2017: 1-6.
|
[31] |
WANG Q , HUANG J , CHEN Y ,et al. $ PROST $:privacy-preserving and truthful online double auction for spectrum allocation[J]. IEEE Transactions on Information Forensics and Security, 2018,14(2): 374-386.
|
[32] |
PAN M , ZHU X , FANG Y . Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer[J]. Wireless Networks, 2012,18(2): 113-128.
|
[33] |
CHEN Y , TIAN X , WANG Q ,et al. ARMOR:a secure combinatorial auction for heterogeneous spectrum[J]. IEEE Transactions on Mobile Computing, 2019,18(10): 2270-2284.
|