Fairness with an Honest Minority and a Rational Majority
暂无分享,去创建一个
[1] Moni Naor,et al. Games for exchanging information , 2008, STOC.
[2] B. Faltings,et al. M-DPOP: Faithful Distributed Implementation of Efficient Social Choice Problems , 2008, J. Artif. Intell. Res..
[3] M. Naor,et al. Cryptography and Game Theory: Designing Protocols for Exchanging Information , 2008, TCC.
[4] Jonathan Katz,et al. Bridging Game Theory and Cryptography: Recent Results and Future Directions , 2008, TCC.
[5] Jonathan Katz,et al. Rational Secret Sharing, Revisited , 2006, SCN.
[6] Anna Lysyanskaya,et al. Rationality and Adversarial Behavior in Multi-party Computation , 2006, CRYPTO.
[7] David Zuckerman,et al. Random Selection with an Adversarial Majority , 2006, CRYPTO.
[8] Danny Dolev,et al. Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation , 2006, PODC '06.
[9] Tuomas Sandholm,et al. Algorithms for Rationalizability and CURB Sets , 2006, AAAI.
[10] B. Faltings,et al. MDPOP: faithful distributed implementation of efficient social choice problems , 2006, AAMAS '06.
[11] Sergei Izmalkov,et al. Rational secure computation and ideal mechanism design , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[12] Amitanand S. Aiyer,et al. BAR fault tolerance for cooperative services , 2005, SOSP '05.
[13] Moshe Tennenholtz,et al. Non-cooperative computation: Boolean functions with correctness and exclusivity , 2005, Theor. Comput. Sci..
[14] Moshe Babaioff,et al. Mechanism Design for Single-Value Domains , 2005, AAAI.
[15] Abhi Shelat,et al. Collusion-free protocols , 2005, STOC '05.
[16] Noam Nisan,et al. Online ascending auctions for gradually expiring items , 2005, SODA '05.
[17] D. Parkes,et al. Specification faithfulness in networks with rational nodes , 2004, PODC '04.
[18] Abhi Shelat,et al. Completely fair SFE and coalition-safe cheap talk , 2004, PODC '04.
[19] D.C. Parkes,et al. Distributed implementations of Vickrey-Clarke-Groves mechanisms , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[20] Joseph Y. Halpern,et al. Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.
[21] E. Kalai. Large Robust Games , 2004 .
[22] Yoav Shoham,et al. Towards a general theory of non-cooperative computation , 2003, TARK '03.
[23] Benny Pinkas,et al. Fair Secure Two-Party Computation , 2003, EUROCRYPT.
[24] Joan Feigenbaum,et al. Distributed algorithmic mechanism design: recent results and future directions , 2002, DIALM '02.
[25] J. Feigenbaum,et al. A BGP-based mechanism for lowest-cost routing , 2002, ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing.
[26] Markus Jakobsson,et al. Timed Release of Standard Digital Signatures , 2002, Financial Cryptography.
[27] Y. Shoham,et al. Truth revelation in approximately efficient combinatorial auctions , 2002, JACM.
[28] Joan Feigenbaum,et al. Sharing the Cost of Multicast Transmissions , 2001, J. Comput. Syst. Sci..
[29] Moni Naor,et al. Timed Commitments , 2000, CRYPTO.
[30] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[31] J. Weibull,et al. Strategy subsets closed under rational behavior , 1991 .
[32] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[33] M. Whinston,et al. Coalition-Proof Nash Equilibria I. Concepts , 1987 .
[34] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[35] Richard Cleve,et al. Limits on the security of coin flips when half the processors are faulty , 1986, STOC '86.
[36] Andrew Chi-Chih Yao,et al. How to Generate and Exchange Secrets (Extended Abstract) , 1986, FOCS.
[37] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[38] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[39] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[40] Adi Shamir,et al. How to share a secret , 1979, CACM.
[41] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[42] Shien Jin Ong,et al. Fairness with an Honest Minority and a , 2008 .
[43] Ron Lavi,et al. Algorithmic Mechanism Design , 2008, Encyclopedia of Algorithms.
[44] José Luis Ferreira,et al. A Communication-Proof Equilibrium Concept , 1996 .
[45] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[46] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[47] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[48] Avi Wigderson,et al. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract) , 1988, STOC.
[49] J'anos Simon,et al. Proceedings of the twentieth annual ACM symposium on Theory of computing , 1988, STOC 1988.