Sciweavers

133 search results - page 13 / 27
» Towards a Game Theoretic View of Secure Computation
Sort
View
SOUPS
2009
ACM
14 years 2 months ago
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Feedback is viewed as an essential element of ubiquitous computing systems in the HCI literature for helping people manage their privacy. However, the success of online social net...
Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes D...
IADIS
2004
13 years 9 months ago
User Satisfaction and Attitudes Towards an Internet-Based Simulation
This paper presents an analysis of the degree to which attitudes towards an Internet-based simulation depend on how satisfied participants are with the software used. The theoreti...
Knut Ekker
NETCOOP
2007
Springer
14 years 2 months ago
Transit Prices Negotiation: Combined Repeated Game and Distributed Algorithmic Approach
— We present both a game theoretic and a distributed algorithmic approach for the transit price negotiation problem in the interdomain routing framework. We analyze the behavior ...
Dominique Barth, Johanne Cohen, Loubna Echabbi, Ch...
STACS
1992
Springer
13 years 12 months ago
Secure Commitment Against A Powerful Adversary
abstract Rafail Ostrovskyy Ramarathnam Venkatesanz Moti Yungx Secure commitment is a primitive enabling information hiding, which is one of the most basic tools in cryptography. S...
Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yun...
EXPCS
2007
13 years 11 months ago
Experimental economics and experimental computer science: a survey
In surprisingly many computer science research projects, system outcomes may be influenced by computerized or human agents with different economic incentives. Such studies include...
Jens Grossklags