Rational computing protocol based on fuzzy theory

[1]  Christian Esposito,et al.  Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory , 2016, IEEE Transactions on Computers.

[2]  Vilém Vychodil,et al.  Fuzzy logic programming reduced to reasoning with attribute implications , 2015, Fuzzy Sets Syst..

[3]  Alfredo De Santis,et al.  Cloud-based adaptive compression and secure management services for 3D healthcare data , 2015, Future Gener. Comput. Syst..

[4]  Duncan S. Wong,et al.  Fair two-party computation with rational parties holding private types , 2015, Secur. Commun. Networks.

[5]  Zhe Liu,et al.  Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks , 2015, Mob. Inf. Syst..

[6]  Vilém Vychodil,et al.  Parameterizing the Semantics of Fuzzy Attribute Implications by Systems of Isotone Galois Connections , 2014, IEEE Transactions on Fuzzy Systems.

[7]  Fangxiong Xiao,et al.  Dynamic deployment of virtual machines in cloud computing using multi-objective optimization , 2014, Soft Computing.

[8]  Jin Li,et al.  Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.

[9]  Zhe Liu,et al.  New rational parties relying on reputation , 2014, Secur. Commun. Networks.

[10]  Mohammad Shojafar,et al.  FR trust: a fuzzy reputation-based model for trust management in semantic P2P grids , 2014, Int. J. Grid Util. Comput..

[11]  Fatos Xhafa,et al.  An efficient PHR service system supporting fuzzy keyword search and fine-grained access control , 2013, Soft Computing.

[12]  Ueli Maurer,et al.  Rational Protocol Design: Cryptography against Incentive-Driven Adversaries , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.

[13]  Технология Springer Science+Business Media , 2013 .

[14]  Jin Li,et al.  Efficient Fair Conditional Payments for Outsourcing Computations , 2012, IEEE Transactions on Information Forensics and Security.

[15]  Jianfeng Ma,et al.  New Algorithms for Secure Outsourcing of Modular Exponentiations , 2012, IEEE Transactions on Parallel and Distributed Systems.

[16]  Rahat Iqbal,et al.  A fuzzy ambient intelligent agents approach for monitoring disease progression of dementia patients , 2012, Journal of Ambient Intelligence and Humanized Computing.

[17]  Jonathan Katz,et al.  Fair Computation with Rational Players , 2012, EUROCRYPT.

[18]  Ioannis B. Theocharis,et al.  A multistage genetic fuzzy classifier for land cover classification from satellite imagery , 2011, Soft Comput..

[19]  Umberto Ferraro Petrillo,et al.  Experimentations with source camera identification and Online Social Networks , 2011, Journal of Ambient Intelligence and Humanized Computing.

[20]  Byoungcheon Lee,et al.  New receipt-free voting scheme using double-trapdoor commitment , 2011, Inf. Sci..

[21]  Alfredo Vaccaro,et al.  Cooperative fuzzy controllers for autonomous voltage regulation in Smart Grids , 2011, J. Ambient Intell. Humaniz. Comput..

[22]  Joseph Y. Halpern,et al.  Game theory with costly computation: formulation and application to protocol security , 2010, ICS.

[23]  N. Cao,et al.  Fuzzy Keyword Search over Encrypted Data in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[24]  Ho-fung Leung,et al.  A Formal Model of Fuzzy Ontology with Property Hierarchy and Object Membership , 2008, ER.

[25]  Ho-fung Leung,et al.  Ontology with Likeliness and Typicality of Objects in Concepts , 2006, ER.

[26]  Anna Lysyanskaya,et al.  Rationality and Adversarial Behavior in Multi-party Computation , 2006, CRYPTO.

[27]  Danny Dolev,et al.  Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation , 2006, PODC '06.

[28]  Umberto Straccia,et al.  Towards a Fuzzy Description Logic for the Semantic Web (Preliminary Report) , 2005, ESWC.

[29]  Joseph Y. Halpern,et al.  Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.

[30]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[31]  Andrew Chi-Chih Yao,et al.  How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).

[32]  Hans-Jürgen Zimmermann,et al.  Fuzzy Set Theory - and Its Applications , 1985 .

[33]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[34]  Ran Canetti,et al.  Towards a Game Theoretic View of Secure Computation , 2011 .

[35]  Lluis Godo,et al.  Survey of Contributions to Fuzzy Logic and Its Applications to Artificial Intelligence at the IIIA , 2022 .