Privacy-preserving verifiable incentive mechanism for online crowdsourcing markets
暂无分享,去创建一个
[1] Huadong Ma,et al. A behavior-based incentive mechanism for crowd sensing with budget constraints , 2014, 2014 IEEE International Conference on Communications (ICC).
[2] Yaron Singer,et al. Pricing mechanisms for crowdsourcing markets , 2013, WWW.
[3] Ramachandran Ramjee,et al. Nericell: using mobile smartphones for rich monitoring of road and traffic conditions , 2008, SenSys '08.
[4] Wen-Guey Tzeng. Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters , 2004, IEEE Trans. Computers.
[5] Fan Wu,et al. SPRING: A Strategy-proof and Privacy preserving spectrum auction mechanism , 2013, 2013 Proceedings IEEE INFOCOM.
[6] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[7] Wen Hu,et al. Ear-phone: an end-to-end participatory urban noise mapping system , 2010, IPSN '10.
[8] Amir Herzberg,et al. Secure second price auctions with a rational auctioneer , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[9] Miguel A. Labrador,et al. A location-based incentive mechanism for participatory sensing systems with budget constraints , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications.
[10] Claudio Soriente,et al. Short paper: PEPSI---privacy-enhanced participatory sensing infrastructure , 2011, WiSec '11.
[11] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[12] Deborah Estrin,et al. Participatory Privacy in Urban Sensing , 2008 .
[13] Robert D. Kleinberg,et al. Learning on a budget: posted price mechanisms for online procurement , 2012, EC '12.
[14] Kyriakos Mouratidis,et al. Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.
[15] Nicholas R. Jennings,et al. Efficient Crowdsourcing of Unknown Experts using Multi-Armed Bandits , 2012, ECAI.
[16] Yaron Singer,et al. Budget Feasible Mechanisms , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[17] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[18] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[19] David C. Parkes,et al. Practical secrecy-preserving, verifiably correct and trustworthy auctions , 2006, ICEC '06.
[20] Hongyi Wu,et al. Incentive-aware data dissemination in delay-tolerant mobile networks , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[21] Margaret Martonosi,et al. SignalGuru: leveraging mobile phones for collaborative traffic signal schedule advisory , 2011, MobiSys '11.
[22] Minho Shin,et al. AnonySense: A system for anonymous opportunistic sensing , 2011, Pervasive Mob. Comput..
[23] Hongyi Wu,et al. Bargain-based Stimulation Mechanism for Selfish Mobile Nodes in Participatory Sensing Network , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[24] Xiang-Yang Li,et al. How to crowdsource tasks truthfully without sacrificing utility: Online incentive mechanisms with budget constraint , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[25] Jean C. Walrand,et al. Incentive mechanisms for smartphone collaboration in data acquisition and distributed computing , 2012, 2012 Proceedings IEEE INFOCOM.
[26] Christopher Thorpe,et al. Time-Lapse Cryptography , 2006 .
[27] Yin Zhang,et al. Secure friend discovery in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.
[28] Moni Naor,et al. Privacy preserving auctions and mechanism design , 1999, EC '99.
[29] Alexander J. T. Gurney,et al. Private and Verifiable Interdomain Routing Decisions , 2016, IEEE/ACM Transactions on Networking.
[30] Baik Hoh,et al. Sell your experiences: a market mechanism based incentive for participatory sensing , 2010, 2010 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[31] Sivan Toledo,et al. VTrack: accurate, energy-aware road traffic delay estimation using mobile phones , 2009, SenSys '09.
[32] Michael Walfish,et al. Verifiable auctions for online ad exchanges , 2013, SIGCOMM.
[33] Maria E. Niessen,et al. NoiseTube: Measuring and mapping noise pollution with mobile phones , 2009, ITEE.
[34] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[35] Ari Juels,et al. A Two-Server, Sealed-Bid Auction Protocol , 2002, Financial Cryptography.
[36] Xiang-Yang Li,et al. Efficient, Verifiable and Privacy-Preserving Combinatorial Auction Design , 2013, ArXiv.
[37] Xi Fang,et al. Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing , 2012, Mobicom '12.