Table of contents
Articles
Secure implementation
Tatsuyoshi Saijo, Tomas Sjostrom, and Takehiko Yamato |
Abstract
PRINT VIEW 203–229 |
Cold feet
Larry G. Epstein and Igor Kopylov |
Abstract
PRINT VIEW 231–259 |
Updating preferences with multiple priors
Eran Hanany and Peter Klibanoff |
Abstract
PRINT VIEW 261–298 |
Efficiency in repeated trade with hidden valuations
Susan Athey and David A. Miller |
Abstract
PRINT VIEW 299–354 |