Sciweavers

1064 search results - page 121 / 213
» Cryptography from Anonymity
Sort
View
WINE
2007
Springer
97views Economy» more  WINE 2007»
14 years 4 months ago
K-NCC: Stability Against Group Deviations in Non-cooperative Computation
A function is non-cooperative computable [NCC] if honest agents can compute it by reporting truthfully their private inputs, while unilateral deviations by the players are not bene...
Itai Ashlagi, Andrey Klinger, Moshe Tennenholtz
WPES
2005
ACM
14 years 4 months ago
The privacy cost of the second-chance offer
This paper examines a generalization of a two-stage game common on eBay: an ascending-price auction followed by price discrimination (the second chance offer). High bids in the a...
Sumit Joshi, Yu-An Sun, Poorvi L. Vora
ISW
2005
Springer
14 years 4 months ago
Tracing-by-Linking Group Signatures
In a group signature [19], any group member can sign on behalf of the group while remaining anonymous, but its identity can be traced in an future dispute investigation. Essentiall...
Victor K. Wei
ACISP
2001
Springer
14 years 3 months ago
A Practical English Auction with One-Time Registration
An English auction is the most familiar type of auctions. Generally, an electronic auction has mainly two entities, the registration manager(RM) who treats the registration of bidd...
Kazumasa Omote, Atsuko Miyaji
CIKM
2008
Springer
14 years 16 days ago
Towards privacy-preserving integration of distributed heterogeneous data
More and more applications rely heavily on large amounts of data in the distributed storages collected over time or produced by large scale scientific experiments or simulations. ...
Pawel Jurczyk, Li Xiong