Rational Multiparty Computation
暂无分享,去创建一个
[1] Abhi Shelat,et al. Collusion-free protocols , 2005, STOC '05.
[2] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[3] Adi Shamir,et al. How to share a secret , 1979, CACM.
[4] William Poundstone,et al. Prisoner's Dilemma: John Von Neumann, Game Theory and the Puzzle of the Bomb , 1992 .
[5] Moshe Tennenholtz,et al. Non-cooperative computation: Boolean functions with correctness and exclusivity , 2005, Theor. Comput. Sci..
[6] Tobias Scheffer,et al. Nash Equilibria of Static Prediction Games , 2009, NIPS.
[7] Tansu Alpcan,et al. Network Security , 2010 .
[8] Mikhail J. Atallah,et al. Efficient Correlated Action Selection , 2006, Financial Cryptography.
[9] Zhifang Zhang,et al. Rational secret sharing as extensive games , 2013, Science China Information Sciences.
[10] Georg Fuchsbauer,et al. Efficient Rational Secret Sharing in Standard Communication Networks , 2010, IACR Cryptol. ePrint Arch..
[11] Abhi Shelat,et al. Collusion-Free Multiparty Computation in the Mediated Model , 2009, CRYPTO.
[12] John C. Harsanyi,et al. Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..
[13] Prabir Bhattacharya,et al. Game theoretic models for detecting network intrusions , 2008, Comput. Commun..
[15] Jonathan Katz,et al. Bridging Game Theory and Cryptography: Recent Results and Future Directions , 2008, TCC.
[16] Benny Pinkas,et al. FairplayMP: a system for secure multi-party computation , 2008, CCS.
[17] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[18] Zhifang Zhang,et al. Unconditionally Secure Rational Secret Sharing in Standard Communication Networks , 2010, ICISC.
[19] Sergei Izmalkov,et al. Rational secure computation and ideal mechanism design , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[20] J. Nash. NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.
[21] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[22] Anna Lysyanskaya,et al. Rationality and Adversarial Behavior in Multi-party Computation , 2006, CRYPTO.
[23] Chris Clifton,et al. AC-Framework for Privacy-Preserving Collaboration , 2007, SDM.
[24] Chris Clifton,et al. Classifier evaluation and attribute selection against active adversaries , 2010, Data Mining and Knowledge Discovery.
[25] Paul W. Goldberg,et al. The Complexity of Computing a Nash Equilibrium , 2009, SIAM J. Comput..
[26] Tobias Scheffer,et al. Stackelberg games for adversarial prediction problems , 2011, KDD.
[27] Rafail Ostrovsky,et al. How to withstand mobile virus attacks (extended abstract) , 1991, PODC '91.
[28] James E. Eaves,et al. Walrasian Tâtonnement Auctions on the Tokyo Grain Exchange , 2007 .
[29] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[30] Abhi Shelat,et al. Collusion-Free Protocols in the Mediated Model , 2008, CRYPTO.
[31] Ivan Damgård,et al. Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.
[32] Ueli Maurer,et al. Collusion-Preserving Computation , 2012, IACR Cryptol. ePrint Arch..
[33] Janez Demsar,et al. Statistical Comparisons of Classifiers over Multiple Data Sets , 2006, J. Mach. Learn. Res..
[34] Amir Globerson,et al. Nightmare at test time: robust learning by feature deletion , 2006, ICML.
[35] Abhi Shelat,et al. Purely Rational Secret Sharing (Extended Abstract) , 2009, TCC.
[36] Nuno Vasconcelos,et al. Risk minimization, probability elicitation, and cost-sensitive SVMs , 2010, ICML.
[37] Jonathan Katz,et al. Byzantine Agreement with a Rational Adversary , 2012, ICALP.
[38] Tomas Toft,et al. On Secure Two-Party Integer Division , 2012, Financial Cryptography.
[39] Steven Salzberg,et al. On Comparing Classifiers: Pitfalls to Avoid and a Recommended Approach , 1997, Data Mining and Knowledge Discovery.
[40] Murali S. Kodialam,et al. Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[41] Ran Canetti,et al. Toward a Game Theoretic View of Secure Computation , 2011, Journal of Cryptology.
[42] Christopher Meek,et al. Adversarial learning , 2005, KDD '05.
[43] Fabio Roli,et al. Adversarial Pattern Classification Using Multiple Classifiers and Randomisation , 2008, SSPR/SPR.
[44] Eitan Zemel,et al. Nash and correlated equilibria: Some complexity considerations , 1989 .
[45] E. Kushilevitz. Foundations of Cryptography Foundations of Cryptography , 2014 .
[46] Christos H. Papadimitriou,et al. On the Complexity of the Parity Argument and Other Inefficient Proofs of Existence , 1994, J. Comput. Syst. Sci..
[47] Douglas R. Stinson,et al. Socio-Rational Secret Sharing as a New Direction in Rational Cryptography , 2012, GameSec.
[48] Moni Naor,et al. Privacy preserving auctions and mechanism design , 1999, EC '99.
[49] Jason D. M. Rennie. ifile: An Application of Machine Learning to E-Mail Filtering , 2000 .
[50] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[51] Blaine Nelson,et al. Adversarial machine learning , 2019, AISec '11.
[52] C. Pandu Rangan,et al. Rational Secret Sharing with Repeated Games , 2008, ISPEC.
[53] Mariana Raykova,et al. Outsourcing Multi-Party Computation , 2011, IACR Cryptol. ePrint Arch..
[54] Alon Rosen,et al. Sequential Rationality in Cryptographic Protocols , 2010, FOCS.
[55] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[56] Branislav Bosanský,et al. Game-theoretic resource allocation for malicious packet detection in computer networks , 2012, AAMAS.
[57] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[58] Tim Roughgarden,et al. Algorithmic Game Theory , 2007 .
[59] Jonathan Katz,et al. Rational Secret Sharing, Revisited , 2006, SCN.
[60] Joseph Y. Halpern,et al. Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.
[61] Shai Halevi,et al. A Cryptographic Solution to a Game Theoretic Problem , 2000, CRYPTO.
[62] Lin Chen,et al. A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks , 2009, IEEE Transactions on Information Forensics and Security.
[63] Stas Filshtinskiy. Cybercrime, cyberweapons, cyber wars: is there too much of it in the air? , 2013, CACM.
[64] Yehuda Lindell,et al. Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries , 2007, TCC.
[65] Sanjay Chawla,et al. Mining adversarial patterns via regularized loss minimization , 2010, Machine Learning.
[66] A. Urbano,et al. Computationally restricted unmediated talk under incomplete information , 2004 .
[67] Ran Canetti,et al. Universally Composable Security with Local Adversaries , 2012, SCN.
[68] Moni Naor,et al. Games for exchanging information , 2008, STOC.
[69] Joseph Y. Halpern,et al. Game Theory with Costly Computation , 2008, ArXiv.
[70] Richard Colbaugh,et al. Predictive defense against evolving adversaries , 2012, 2012 IEEE International Conference on Intelligence and Security Informatics.
[71] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[72] Giacomo Bonanno,et al. AGM-consistency and perfect Bayesian equilibrium. Part I: definition and properties , 2013, Int. J. Game Theory.
[73] Yehuda Lindell,et al. A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.
[74] Ivan Damgård,et al. Asynchronous Multiparty Computation: Theory and Implementation , 2008, IACR Cryptol. ePrint Arch..
[75] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[76] Chris Clifton,et al. Privacy Preserving Tâtonnement - A Cryptographic Construction of an Incentive Compatible Market , 2014, Financial Cryptography.
[77] Richard Cole,et al. Fast-converging tatonnement algorithms for one-time and ongoing market problems , 2008, STOC.
[78] Bernhard von Stengel,et al. Extensive-Form Correlated Equilibrium: Definition and Computational Complexity , 2008, Math. Oper. Res..
[79] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[80] Moni Naor,et al. Cryptography and Game Theory: Designing Protocols for Exchanging Information , 2008, TCC.
[81] Chris Clifton,et al. An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems , 2008, Manuf. Serv. Oper. Manag..
[82] Xenofontas A. Dimitropoulos,et al. SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics , 2010, USENIX Security Symposium.
[83] Keith B. Frikken,et al. PBS: Private Bartering Systems , 2008, Financial Cryptography.
[84] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[85] Peter Bro Miltersen,et al. Privacy-enhancing auctions using rational cryptography , 2009, BQGT.
[86] Jonathan Katz,et al. Fair Computation with Rational Players , 2012, EUROCRYPT.
[87] Pedro M. Domingos,et al. Adversarial classification , 2004, KDD.