Volume 2, Number 3 ( 2007)

Previous issue | Next issue

Table of contents

Articles

Secure implementation
        Tatsuyoshi Saijo, Tomas Sjostrom, and Takehiko Yamato
Abstract  PRINT  VIEW
203–229
Cold feet
        Larry G. Epstein and Igor Kopylov
Abstract  PRINT  VIEW
231–259
Updating preferences with multiple priors
        Eran Hanany and Peter Klibanoff
Abstract  PRINT  VIEW
261–298
Efficiency in repeated trade with hidden valuations
        Susan Athey and David A. Miller
Abstract  PRINT  VIEW
299–354
Papers in this issue have on average been downloaded from 6900 distinct IP addresses.