Privacy in implementation
From MaRDI portal
Publication:1703368
DOI10.1007/s00355-017-1095-zzbMath1392.91055OpenAlexW1598837934MaRDI QIDQ1703368
Publication date: 2 March 2018
Published in: Social Choice and Welfare (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00355-017-1095-z
Related Items (4)
Voting in the limelight ⋮ Menu mechanisms ⋮ Communication with endogenous deception costs ⋮ The Empirical Implications of Privacy-Aware Choice
Cites Work
- Unnamed Item
- Nash implementation with partially honest individuals
- Subgame perfect implementation: A necessary and almost sufficient condition
- On constant Maskin monotonic social choice functions
- Psychological games and sequential rationality
- Agreeing to disagree
- The equivalence of strong positive association and strategy-proofness
- Motives and implementation: On the design of mechanisms to elicit opinions
- Voting in the limelight
- Behavioral aspects of implementation theory
- Perception games and privacy
- Mechanism design with possibilistic beliefs
- Selling privacy at auction
- Subgame perfect implementation: a full characterization
- A crash course in implementation theory
- Role of honesty in full implementation
- Is privacy compatible with truthfulness?
- Privacy-Enhancing Auctions Using Rational Cryptography
- Virtual Implementation in Nash Equilibrium
- Subgame Perfect Implementation
- Full Extraction of the Surplus in Bayesian and Dominant Strategy Auctions
- Feasible and Continuous Implementation
- Nash Equilibrium and Welfare Optimality
- The Theory of Implementation of Social Choice Rules
This page was built for publication: Privacy in implementation