Secure distributed human computation
暂无分享,去创建一个
Craig Gentry | Zulfikar Ramzan | Stuart G. Stubblebine | Craig Gentry | Zulfikar Ramzan | S. Stubblebine
[1] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[2] C. K. Prahalad,et al. The Fortune at the Bottom of the Pyramid , 2004 .
[3] Manuel Blum,et al. Self-testing/correcting with applications to numerical problems , 1990, STOC '90.
[4] Ben Y. Zhao,et al. Approximate Object Location and Spam Filtering on Peer-to-Peer Systems , 2003, Middleware.
[5] Russ Bubley,et al. Randomized algorithms , 1995, CSUR.
[6] Aravind Srinivasan,et al. Chernoff-Hoeffding bounds for applications with limited independence , 1995, SODA '93.
[7] Manuel Blum,et al. Designing programs that check their work , 1989, STOC '89.
[8] J. S. Gage. The great Internet Mersenne prime search. , 1998, M.D. computing : computers in medical practice.
[9] Seif Haridi,et al. Distributed Algorithms , 1992, Lecture Notes in Computer Science.
[10] Philippe Golle,et al. Uncheatable Distributed Computations , 2001, CT-RSA.
[11] L. A. Goodman,et al. Social Choice and Individual Values , 1951 .
[12] John Langford,et al. Telling humans and computers apart automatically , 2004, CACM.
[13] Oded Goldreich. Foundations of Cryptography: Volume 1 , 2006 .
[14] Nancy A. Lynch,et al. Impossibility of distributed consensus with one faulty process , 1983, PODS '83.
[15] X. Drèze,et al. Internet advertising: Is anybody watching? , 2003 .
[16] Gage Js,et al. The great Internet Mersenne prime search. , 1998 .
[17] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.
[18] Laura A. Dabbish,et al. Labeling images with a computer game , 2004, AAAI Spring Symposium: Knowledge Collection from Volunteer Contributors.
[19] Ronald Cramer,et al. A Secure and Optimally Efficient Multi-Authority Election Scheme ( 1 ) , 2000 .