Sciweavers

346 search results - page 25 / 70
» The Secret Santa Problem
Sort
View
UAI
2004
13 years 11 months ago
Sequential Information Elicitation in Multi-Agent Systems
We introduce the study of sequential information elicitation in strategic multi-agent systems. In an information elicitation setup a center attempts to compute the value of a func...
Rann Smorodinsky, Moshe Tennenholtz
TDSC
2008
125views more  TDSC 2008»
13 years 9 months ago
Trustworthy Computing under Resource Constraints with the DOWN Policy
Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use today, albeit limited predominantly to scenarios where constraints on cost is not a seriou...
Mahalingam Ramkumar
MTA
2007
82views more  MTA 2007»
13 years 9 months ago
A scalable signature scheme for video authentication
This paper addresses the problem of ensuring the integrity of a digital video and presents a scalable signature scheme for video authentication based on cryptographic secret sharin...
Pradeep K. Atrey, Wei-Qi Yan, Mohan S. Kankanhalli
IPPS
2005
IEEE
14 years 3 months ago
On the Optimal Placement of Secure Data Objects over Internet
Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Manghui Tu, Peng Li, Qingkai Ma, I-Ling Yen, Farok...
JSS
2007
79views more  JSS 2007»
13 years 9 months ago
Security problems with improper implementations of improved FEA-M
This paper reports security problems with improper implementations of an improved version of FEA-M (fast encryption algorithm for multimedia). It is found that an implementation-d...
Shujun Li, Kwok-Tung Lo