Rational computing protocol based on fuzzy theory
暂无分享,去创建一个
Qiuliang Xu | Ho-fung Leung | Yilei Wang | Tao Li | Zhe Liu | Ping Li | Ping Li | Lufeng Chen
[1] Christian Esposito,et al. Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory , 2016, IEEE Transactions on Computers.
[2] Vilém Vychodil,et al. Fuzzy logic programming reduced to reasoning with attribute implications , 2015, Fuzzy Sets Syst..
[3] Alfredo De Santis,et al. Cloud-based adaptive compression and secure management services for 3D healthcare data , 2015, Future Gener. Comput. Syst..
[4] Duncan S. Wong,et al. Fair two-party computation with rational parties holding private types , 2015, Secur. Commun. Networks.
[5] Zhe Liu,et al. Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks , 2015, Mob. Inf. Syst..
[6] Vilém Vychodil,et al. Parameterizing the Semantics of Fuzzy Attribute Implications by Systems of Isotone Galois Connections , 2014, IEEE Transactions on Fuzzy Systems.
[7] Fangxiong Xiao,et al. Dynamic deployment of virtual machines in cloud computing using multi-objective optimization , 2014, Soft Computing.
[8] Jin Li,et al. Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.
[9] Zhe Liu,et al. New rational parties relying on reputation , 2014, Secur. Commun. Networks.
[10] Mohammad Shojafar,et al. FR trust: a fuzzy reputation-based model for trust management in semantic P2P grids , 2014, Int. J. Grid Util. Comput..
[11] Fatos Xhafa,et al. An efficient PHR service system supporting fuzzy keyword search and fine-grained access control , 2013, Soft Computing.
[12] Ueli Maurer,et al. Rational Protocol Design: Cryptography against Incentive-Driven Adversaries , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.
[13] Технология. Springer Science+Business Media , 2013 .
[14] Jin Li,et al. Efficient Fair Conditional Payments for Outsourcing Computations , 2012, IEEE Transactions on Information Forensics and Security.
[15] Jianfeng Ma,et al. New Algorithms for Secure Outsourcing of Modular Exponentiations , 2012, IEEE Transactions on Parallel and Distributed Systems.
[16] Rahat Iqbal,et al. A fuzzy ambient intelligent agents approach for monitoring disease progression of dementia patients , 2012, Journal of Ambient Intelligence and Humanized Computing.
[17] Jonathan Katz,et al. Fair Computation with Rational Players , 2012, EUROCRYPT.
[18] Ioannis B. Theocharis,et al. A multistage genetic fuzzy classifier for land cover classification from satellite imagery , 2011, Soft Comput..
[19] Umberto Ferraro Petrillo,et al. Experimentations with source camera identification and Online Social Networks , 2011, Journal of Ambient Intelligence and Humanized Computing.
[20] Byoungcheon Lee,et al. New receipt-free voting scheme using double-trapdoor commitment , 2011, Inf. Sci..
[21] Alfredo Vaccaro,et al. Cooperative fuzzy controllers for autonomous voltage regulation in Smart Grids , 2011, J. Ambient Intell. Humaniz. Comput..
[22] Joseph Y. Halpern,et al. Game theory with costly computation: formulation and application to protocol security , 2010, ICS.
[23] N. Cao,et al. Fuzzy Keyword Search over Encrypted Data in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[24] Ho-fung Leung,et al. A Formal Model of Fuzzy Ontology with Property Hierarchy and Object Membership , 2008, ER.
[25] Ho-fung Leung,et al. Ontology with Likeliness and Typicality of Objects in Concepts , 2006, ER.
[26] Anna Lysyanskaya,et al. Rationality and Adversarial Behavior in Multi-party Computation , 2006, CRYPTO.
[27] Danny Dolev,et al. Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation , 2006, PODC '06.
[28] Umberto Straccia,et al. Towards a Fuzzy Description Logic for the Semantic Web (Preliminary Report) , 2005, ESWC.
[29] Joseph Y. Halpern,et al. Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.
[30] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[31] Andrew Chi-Chih Yao,et al. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[32] Hans-Jürgen Zimmermann,et al. Fuzzy Set Theory - and Its Applications , 1985 .
[33] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[34] Ran Canetti,et al. Towards a Game Theoretic View of Secure Computation , 2011 .
[35] Lluis Godo,et al. Survey of Contributions to Fuzzy Logic and Its Applications to Artificial Intelligence at the IIIA , 2022 .