Table of contents
Articles
|
Secure implementation
Tatsuyoshi Saijo, Tomas Sjostrom, and Takehiko Yamato |
Abstract
PRINT VIEW 203–229 |
|
Cold feet
Larry G. Epstein and Igor Kopylov |
Abstract
PRINT VIEW 231–259 |
|
Updating preferences with multiple priors
Eran Hanany and Peter Klibanoff |
Abstract
PRINT VIEW 261–298 |
|
Efficiency in repeated trade with hidden valuations
Susan Athey and David A. Miller |
Abstract
PRINT VIEW 299–354 |