Funder
National Natural Science Foundation of China
Technology Planning Project of Guangdong Province, China
Ph.D. Programs Foundation of Ludong University
Fujian Provincial Key Laboratory of Network Security and Cryptology Research Fund (Fujian Normal University)
Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Theoretical Computer Science,Software
Reference55 articles.
1. Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation;Abraham,2006
2. Social decision making processes and the equal partitionment of shared resources;Allison;J. Exp. Soc. Psychol.,1992
3. Collusion-preserving computation;Alwen,2012
4. Utility dependence in correct and fair rational secret sharing;Asharov,2009
5. Security against covert adversaries: Efficient protocols for realistic adversaries;Aumann;J. Cryptol.,2010
Cited by
36 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An Agent-Based Social Simulation for Citizenship Competences and Conflict Resolution Styles;International Journal on Semantic Web and Information Systems;2022-09-09
2. IoT Data Compression and Optimization Techniques in Cloud Storage;Research Anthology on Convergence of Blockchain, Internet of Things, and Security;2022-07-08
3. Collusion-free for Cloud Verification toward the View of Game Theory;ACM Transactions on Internet Technology;2022-05-31
4. A Knowledge-Oriented Recommendation System for Machine Learning Algorithm Finding and Data Processing;Research Anthology on Machine Learning Techniques, Methods, and Applications;2022-05-13
5. Future of Internet of Things;International Journal of Cloud Applications and Computing;2022-02-24