Filters








574 Hits in 5.0 sec

Cryptographic Implications for Artificially Mediated Games [article]

Thomas Kellam Meyer
2009 arXiv   pre-print
The primary condition for a correlated equilibrium is the presence of a mediator within the game. This is simply a neutral and mutually trusted entity.  ...  However, there seem to be a multitude of situations in which no mediator could exist. Thus, games modeling these sorts of cases could not use these entities as tools for analysis.  ...  an unfair artificially mediated game.  ... 
arXiv:1001.0054v1 fatcat:kzmm6pgnljdbnkmsbxvi7ixuai

Game theory with costly computation

Rafael Pass, Joe Halpern
2010 Proceedings of the Behavioral and Quantitative Game Theory on Conference on Future Directions - BQGT '10  
We develop a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation.  ...  into account, the two approaches used for dealing with "deviating" players in two different communities-Nash equilibrium in game theory and zero-knowledge "simulation" in cryptography-are intimately related  ...  Acknowledgments The second author wishes to thank Silvio Micali and abhi shelat for many exciting discussions about cryptography and game theory, and Ehud and Adam Kalai for enlightening discussions.  ... 
doi:10.1145/1807406.1807495 dblp:conf/bqgt/PassH10 fatcat:kyna5caupzbhjkb5dtjnwa52gq

Toward a Game Theoretic View of Secure Computation

Gilad Asharov, Ran Canetti, Carmit Hazay
2015 Journal of Cryptology  
for rational players.  ...  We demonstrate how Game Theoretic concepts and formalism can be used to capture cryptographic notions of security.  ...  Specifically, they showed that any mediated game where (1) the mediator is guaranteed to either give the full function output to both parties or give nothing to both, and (2) both parties have positive  ... 
doi:10.1007/s00145-015-9212-6 fatcat:2a2im4xaijafpoeadm6wuefp2i

Towards a Game Theoretic View of Secure Computation [chapter]

Gilad Asharov, Ran Canetti, Carmit Hazay
2011 Lecture Notes in Computer Science  
for rational players.  ...  We demonstrate how Game Theoretic concepts and formalism can be used to capture cryptographic notions of security.  ...  Specifically, they showed that any mediated game where (1) the mediator is guaranteed to either give the full function output to both parties or give nothing to both, and (2) both parties have positive  ... 
doi:10.1007/978-3-642-20465-4_24 fatcat:wrloku7wbng4bcnjjnobvguilq

Cryptocurrencies as narrative technologies

Mark Coeckelbergh, Wessel Reijers
2016 Computers & society  
framework for the ethics of cryptocurrencies.  ...  We show how cryptocurrencies such as Bitcoin dynamically re-configure social relations and explore the consequent ethical implications.  ...  ACKNOWLEDGMENTS The ADAPT Centre for Digital Content Technology is funded under the SFI Research Centres Programme (Grant 13/RC/2106) and is co-funded under the European Regional Development Fund.  ... 
doi:10.1145/2874239.2874264 fatcat:5w5v2y5q6vce7ponmpnk22b2ny

Artificial Intelligence Implementations on the Blockchain. Use Cases and Future Applications

Konstantinos Sgantzos, Ian Grigg
2019 Future Internet  
Furthermore, blockchain's immutability constructs a fruitful environment for creating high quality, permanent and growing datasets for deep learning.  ...  Data scientists have long struggled to maintain the quality of a dataset for machine learning by an AI entity.  ...  Papageorgiou and Emmanouil Benis for their helpful discussions and proofreading on early drafts of this work. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/fi11080170 fatcat:cougfs7yvnc5xoxggqre32fj5e

CloudVaults: Integrating Trust Extensions into System Integrity Verification for Cloud-based Environments

B. Larsen, D. Bergsson, T. Giannetsos
2020 Zenodo  
distributed, mixed-criticality services, it also raises significant concerns for their security, resilience, and configuration correctness.  ...  While the rapid evolution of container-based virtualization technologies, emerging as an integral part of cloud-based environments, brings forth several new opportunities for enabling the provision of  ...  In Section 6, we provide game-based models for our enhanced CIV scheme satisfying all the above properties.  ... 
doi:10.5281/zenodo.4279028 fatcat:vjdlie44wvethckx6kltge6ex4

Dependence on Blockchain Technology for Future Cybersecurity Advancement: A Systematic Analysis

Ayman Abdulsalam, Albert Annor-Antwi, Yang Chunting
2019 International Journal of Computer Applications  
Blockchain only needs reinforcement from technologies such as Artificial Intelligence and Machine learning to make it the future's most dependable cybersecurity provider.  ...  For one to understand how hashing takes place, they need to understand the cryptographic hash basics [14] .  ...  Game developers also provide public addressed that are associated participants' activities in games, especially performance and scores.  ... 
doi:10.5120/ijca2019919688 fatcat:4dwvapjtrfajdbztadwgvxc4g4

Toni Cade Bambara's vulnerable men [chapter]

Tuula Kolehmainen
2021 Mediating Vulnerability  
More recently, she has published a volume on the Interview as Creative Practice with Rebecca Roach (Special issue of Biography) and she edited Writing Manuals for the Masses (2020) with Dirk de Geest.  ...  This research was also supported by the Foundation for Education and European Culture. Notes  ...  This volume is the result of long-standing discussions that started during two international doctoral summer schools convened by the Hermes Consortium for Literary and Cultural Studies, a network of 11  ... 
doi:10.2307/j.ctv1nnwhjt.9 fatcat:zmcuw3h2wrfczih4jow5sh4f6a

Dependence on Blockchain Technology for Future Cybersecurity Advancement: A Systematic Analysis

Ayman Abdulsalam Mohamed Al-Dherasi, Albert Annor-Antwi, Yang Chunting, School of Electrical and Electronic Technology and Computer Science, Zhejiang University of Science and Technology
2019 American Journal of Computer Sciences and Applications  
Blockchain only needs reinforcement from technologies such as Artificial Intelligence and Machine learning to make it the future's most dependable cybersecurity provider.  ...  DECLARATION OF INTERESTS The authors declare that they have no known competing for financial interests or personal relationships that could have appeared to influence the work reported in this paper.  ...  For one to understand how hashing takes place, they need to understand the cryptographic hash basics [14] .  ... 
doi:10.28933/ajcsa-2019-11-0806 fatcat:i5uv47sqvvc3zpzrrixvep7viu

The Digitization of Word of Mouth: Promise and Challenges of Online Feedback Mechanisms

Chrysanthos Dellarocas
2003 Management science  
It provides an overview of relevant work in game theory and economics on the topic or reputation.  ...  society: online reputation mechanisms, also known as reputation systems (Resnick, Zeckhauser, Friedman and Kuwabara, 2000) are using the Internet's bi-directional communication capabilities in order to artificially  ...  Online word-of-mouth networks are artificially induced through explicitly designed information systems (feedback mediators).Feedback mediators specify who can participate, what type of information is solicited  ... 
doi:10.1287/mnsc.49.10.1407.17308 fatcat:7l2e457fhzdinfloo6q23m5uyi

The Digitization of Word-of-Mouth: Promise and Challenges of Online Feedback Mechanisms

Chrysanthos N. Dellarocas
2003 Social Science Research Network  
Their growing popularity has potentially important implications for a wide range of management activities, such as brand building, customer acquisition and retention, product development, and quality assurance  ...  It provides an overview of relevant work in game theory and economics on the topic of reputation.  ...  in artificial societies of software agents.  ... 
doi:10.2139/ssrn.393042 fatcat:5wty3qalfvel5mdwbpvzwjpr3y

CryptHOL: Game-based Proofs in Higher-order Logic [article]

David A. Basin, Andreas Lochbihler, S. Reza Sefidgar
2017 IACR Cryptology ePrint Archive  
Game-based proofs are a well-established paradigm for structuring security arguments and simplifying their understanding.  ...  CryptHOL is based on a new semantic domain with an associated functional programming language for expressing games.  ...  Reza Sefidgar were supported by the Swiss National Science Foundation grant 153217 "Formalising Computational Soundness for Protocol Implementations".  ... 
dblp:journals/iacr/BasinLS17 fatcat:y5zxivqgnjdn3dlrzekpdkv47q

Upgrading the protection of children from manipulative and addictive strategies in online games: Legal and technical solutions beyond privacy regulation [article]

Tommaso Crepax, Jan Tobias Muehlberg
2022 arXiv   pre-print
In this paper we discuss manipulative and exploitative strategies in the context of online games for children, suggest a number of possible reasons for the failure of the applicable regulatory system,  ...  propose an "upgrade" for the regulatory approach to address these risks from the perspective of freedom of thought, and present and discuss technological approaches that allow for the development of games  ...  As a result, the search for actual impacts of digital manipulation through digital technologies and AI 40 is currently a key issue for the CoE Ad hoc Committee on Artificial Intelligence (CAHAI).  ... 
arXiv:2207.09928v1 fatcat:lpliizbmhzheffwllp7izsb3bq

TAPESTRY: A De-centralized Service for Trusted Interaction Online

Yifan Yang, Daniel Cooper, John Collomosse, Catalin Dragan, Mark Manulis, Jo Briggs, Jamie Steane, Arthi Manohar, Wendy Moncur, Helen Jones
2020 IEEE Transactions on Services Computing  
This is enabled through a novel secure infrastructure combining hybrid on-and off-chain storage combined with deep learning for DP analytics and visualization.  ...  We present a novel de-centralised service for proving the provenance of online digital identity, exposed as an assistive tool to help non-expert users make better decisions about whom to trust online.  ...  In this scenario, we used TAPESTRY to visualize trust evidence derived from real-world DPs of games developers, and artificial profiles fabricated and curated in the months prior to the study.  ... 
doi:10.1109/tsc.2020.2993081 fatcat:sxu7y2ziajblpc4jr56xxhzgia
« Previous Showing results 1 — 15 out of 574 results