My Papers | |||||||
| Publications | ||||||
|
| 1. The Order Independence of Iterated Dominance in Extensive Games J. Chen and S. Micali Theoretical Economics (TE), to appear, 2012. | |||||
|
| 2. Collusive Dominant-Strategy Truthfulness J. Chen and S. Micali Journal of Economic Theory (JET), Vol. 147, Iss. 3, pp. 1300-1312, 2012. | |||||
|
| 3. Crowdsourced Bayesian Auctions P. Azar, J. Chen, and S. Micali Innovations in Theoretical Computer Science (ITCS), 2012. | |||||
|
| 4. Mechanism Design with Set-Theoretic Beliefs J. Chen and S. Micali Symposium on Foundations of Computer Science (FOCS), pp. 87-96, 2011. Full version under review at Journal of Economic Theory (JET). | |||||
|
| 5. Robust Perfect Revenue from Perfectly Informed Players J. Chen, A. Hassidim, and S. Micali Innovations in Theoretical Computer Science (ITCS), pp. 94-105, 2010. | |||||
|
| 6. Robustly Leveraging Collusion in Combinatorial Auctions J. Chen, S. Micali, and P. Valiant Innovations in Theoretical Computer Science (ITCS), pp. 81-93, 2010. | |||||
|
| 7. A New Approach to Auctions and Resilient Mechanism Design J. Chen and S. Micali Symposium on Theory of Computing (STOC), pp. 503-512, 2009. | |||||
|
| 8. A New Framework to the Design and Analysis of Identity-Based Identification Schemes G. Yang, J. Chen, D. Wong, X. Deng, and D. Wang Theoretical Computer Science (TCS), Vol. 407, Iss. 1-3, pp. 370-388, 2008. | |||||
|
| 9. A More Natural Way to Construct Identity-Based Identification Schemes G. Yang, J. Chen, D. Wong, X. Deng, and D. Wang Applied Cryptography and Network Security (ACNS), pp. 307-322, 2007. | |||||
|
| 10. Malicious KGC Attack in Certificateless Cryptography M. H. Au, J. Chen, J. K. Liu, Y. Mu, D. Wong, and G. Yang ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp. 302-311, 2007 | |||||


雷达卡




京公网安备 11010802022788号







