O. Baudron and J. Stern, Non-interactive Private Auctions, Proc. of Fifth Int'l Conf. on Financial Cryptography (FC), 2001.
DOI : 10.1007/3-540-46088-8_28

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.8125

M. Boulkenafed, J. Liu, D. Sacchetti, and V. Issarny, Group Management in Mobile Ad Hoc Networks: Design, Implementation and Experiments, INRIA Research Report, vol.5060, 2003.

F. Brandt and G. Weiß, Vicious strategies for Vickrey auctions, Proceedings of the fifth international conference on Autonomous agents , AGENTS '01, 2001.
DOI : 10.1145/375735.375880

L. Buttyan and J. P. Hubaux, Stimulating cooperation in self-organizing mobile ad hoc networks, Kluwer Mobile Networks and Applications, 2003.

L. Capra, W. Emmerich, and C. Mascolo, CARISMA: Context-Aware Reflective mIddleware System for Mobile Applications, IEEE Transactions on Software Engineering, vol.29, issue.10, 2003.
DOI : 10.1109/TSE.2003.1237173

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.324.4706

J. Feigenbaum and S. Shenker, Distributed algorithmic mechanism design, Proceedings of the 6th international workshop on Discrete algorithms and methods for mobile computing and communications , DIALM '02, 2002.
DOI : 10.1145/570810.570812

M. Franklin and M. Reiter, The design and implementation of a secure auction service, IEEE Transactions on Software Engineering, vol.5, pp.302-312, 1996.

M. Harkavy, J. D. Tygar, and H. Kikuchi, Electronic auctions with private bids, Proc. of the 3rd USENIX Workshop on Electronic Commerce, 1998.

V. Issarny, D. Sacchetti, F. Tartanoglu, F. Sailhan, R. Chibout et al., Developing Ambient Intelligence Systems: A Solution based on Web Services, Automated Software Engineering, vol.12, issue.1, 2004.
DOI : 10.1023/B:AUSE.0000049210.42738.00

URL : https://hal.archives-ouvertes.fr/inria-00414951

J. Liu and V. Issarny, Enhanced Reputation Mechanism for Mobile Ad Hoc Networks, Proc. of the 2nd Int'l Conf. on Trust Management, 2004.
DOI : 10.1007/978-3-540-24747-0_5

URL : https://hal.archives-ouvertes.fr/inria-00414803

J. Liu and V. Issarny, QoS-aware service location in mobile ad hoc networks, Proc. of 2004 IEEE Int'l Conf. on Mobile Data Management, 2004.
URL : https://hal.archives-ouvertes.fr/inria-00414802

S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, 2000.
DOI : 10.1145/345910.345955

M. Mcmillan, Selling Spectrum Rights, Journal of Economic Perspectives, vol.8, issue.3, 1994.
DOI : 10.1257/jep.8.3.145

V. Miller, Use of Elliptic Curves in Cryptography, Proc. of CRYPTO 85, 1985.
DOI : 10.1007/3-540-39799-X_31

M. Naor, B. Pinkas, and R. Sumner, Privacy preserving auctions and mechanism design, Proceedings of the 1st ACM conference on Electronic commerce , EC '99, 1999.
DOI : 10.1145/336992.337028

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.17.7459

N. Nisan and A. Ronen, Algorithmic mechanism design, 31st ACM Symp. on Theory of Computing, pp.129-140, 2001.

P. Obreiter, B. König-ries, and M. Klein, Stimulating cooperative behavior of autonomous devices: An analysis of requirements and existing approaches, Proc. of the 2nd Int'l Workshop on Wireless Information Systems, 2003.

T. Pedersen, Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Advances in Cryptology ? CRYPTO 1991, pp.129-140, 1991.
DOI : 10.1007/3-540-46766-1_9

M. H. Rothkopf, T. J. Teisberg, and E. P. Kahn, Why Are Vickrey Auctions Rare?, Journal of Political Economy, vol.98, issue.1, pp.94-109, 1990.
DOI : 10.1086/261670

T. W. Sandholm, Limitations of the Vickrey auction in computational multiagent systems, Proc. of the 2nd Int'l Conf. on Multi-Agent Systems, 1996.

C. Szyperski, Component technology - what, where, and how?, 25th International Conference on Software Engineering, 2003. Proceedings., 2003.
DOI : 10.1109/ICSE.2003.1201255

H. R. Varian, Economic mechanism design for computerized agents, Proceedings of the First Usenix Conference on Electronic Commerce, 1995.

W. Vickrey, COUNTERSPECULATION, AUCTIONS, AND COMPETITIVE SEALED TENDERS, The Journal of Finance, vol.16, issue.1, pp.8-37, 1961.
DOI : 10.1111/j.1540-6261.1961.tb02789.x

N. Vulkan and N. R. Jennings, Efficient mechanisms for the supply of services in multi-agent environments, Decision Support Systems, vol.28, issue.1-2, 2000.
DOI : 10.1016/S0167-9236(99)00071-8

M. J. Wiener, Performance comparison of public-key cryptosystems. CryptoBytes, Technical Newsletter of RSA Laboratories, 1998.

S. Zhong, J. Chen, and Y. R. Yang, Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), 2003.
DOI : 10.1109/INFCOM.2003.1209220