Volume 2, Number 3 (September 2007)

Previous issue | Next issue

Table of contents


Secure implementation Abstract  PRINT  VIEW
Tatsuyoshi Saijo, Tomas Sjostrom, and Takehiko Yamato 203–229
Cold feet Abstract  PRINT  VIEW
Larry G. Epstein and Igor Kopylov 231–259
Updating preferences with multiple priors Abstract  PRINT  VIEW
Eran Hanany and Peter Klibanoff 261–298
Efficiency in repeated trade with hidden valuations Abstract  PRINT  VIEW
Susan Athey and David A. Miller 299–354
Papers in this issue have on average been downloaded from 3912 distinct IP addresses.