Sciweavers

116 search results - page 20 / 24
» Selling Privacy at Auction
Sort
View
SIGECOM
2011
ACM
256views ECommerce» more  SIGECOM 2011»
14 years 3 months ago
Competitive equilibrium in two sided matching markets with general utility functions
In this paper, we study the class of competitive equilibria in two sided matching markets with general (non-quasilinear) utility functions. Mechanism design in general non-quasili...
Saeed Alaei, Kamal Jain, Azarakhsh Malekian
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
16 years 29 days ago
On Tamper-Resistance from a Theoretical Viewpoint
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
Paulo Mateus, Serge Vaudenay
WWW
2004
ACM
16 years 1 months ago
Filtering spam e-mail on a global scale
In this paper we analyze a very large junk e-mail corpus which was generated by a hundred thousand volunteer users of the Hotmail e-mail service. We describe how the corpus is bei...
Geoff Hulten, Joshua T. Goodman, Robert Rounthwait...
HPCC
2011
Springer
14 years 2 days ago
Achieving Performance and Availability Guarantees with Spot Instances
Abstract—In the Infrastructure-as-a-Service (IaaS) cloud computing market, spot instances refer to virtual servers that are rented via an auction. Spot instances allow IaaS provi...
Michele Mazzucco, Marlon Dumas
CCS
2010
ACM
15 years 19 days ago
Accountability: definition and relationship to verifiability
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting, auction, identity-based encryption, and certain forms of secure multi-party computation,...
Ralf Küsters, Tomasz Truderung, Andreas Vogt