Sciweavers

218 search results - page 43 / 44
» Privacy in Distributed Electronic Commerce
Sort
View
79
Voted
AAAI
2012
12 years 12 months ago
Optimal Auctions for Spiteful Bidders
Designing revenue-optimal auctions for various settings is perhaps the most important, yet sometimes most elusive, problem in mechanism design. Spiteful bidders have been intensel...
Pingzhong Tang, Tuomas Sandholm
IAT
2005
IEEE
15 years 3 months ago
Sharing Engineering Information and Knowledge
This paper describes an agent-based recommendation system developed to support knowledge acquisition and sharing processes. Its purpose is to aid the process of community building...
Mauro F. Koyama, Olga Nabuco, Francisco Edeneziano...
EXPERT
2006
107views more  EXPERT 2006»
14 years 9 months ago
Provenance in Agent-Mediated Healthcare Systems
Agent-oriented cooperation techniques and standardized electronic healthcare record exchange protocols can be used to combine information regarding different facets of a therapy re...
Tamás Kifor, László Zsolt Var...
IDTRUST
2009
ACM
15 years 4 months ago
Usable secure mailing lists with untrusted servers
Mailing lists are a natural technology for supporting messaging in multi-party, cross-domain collaborative tasks. However, whenever sensitive information is exchanged on such list...
Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Bas...
ACNS
2006
Springer
121views Cryptology» more  ACNS 2006»
15 years 3 months ago
Authentication for Paranoids: Multi-party Secret Handshakes
In a society increasingly concerned with the steady assault on electronic privacy, the need for privacy-preserving techniques is both natural and justified. This need extends to t...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik