We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 41-60 of 10,000 results
  1. Equilibrium Analysis of Customer Attraction Games

    We introduce a game model called “customer attraction game” to demonstrate the competition among online content providers. In this model, customers...
    **aotie Deng, Ningyuan Li, ... Qi Qi in Web and Internet Economics
    Conference paper 2024
  2. The Importance of Knowing the Arrival Order in Combinatorial Bayesian Settings

    We study the measure of order-competitive ratio introduced by Ezra et al. [16] for online algorithms in Bayesian combinatorial settings. In our...
    Tomer Ezra, Tamar Garbuz in Web and Internet Economics
    Conference paper 2024
  3. Online Matching with Stochastic Rewards: Advanced Analyses Using Configuration Linear Programs

    Mehta and Panigrahi (2012) proposed Online Matching with Stochastic Rewards, which generalizes the Online Bipartite Matching problem of Karp,...
    Zhiyi Huang, Hanrui Jiang, ... Qiankun Zhang in Web and Internet Economics
    Conference paper 2024
  4. Reallocation Mechanisms Under Distributional Constraints in the Full Preference Domain

    We study the problem of reallocating indivisible goods among a set of agents in one-sided matching market, where the feasible set for each good is...
    **shan Zhang, Bo Tang, ... Jianwei Yin in Web and Internet Economics
    Conference paper 2024
  5. Experimental Results for Cryptcodes Based on Quasigroups for Transmission Through a BSC

    In this chapter, we present experimental results for cryptcodes based on quasigroups for transmission through a binary-symmetric channel (BSC). In...
    Daniela Mechkaroska, Aleksandra Popovska-Mitrovikj, Verica Bakeva in Cryptocoding Based on Quasigroups
    Chapter 2024
  6. Wie man effektiver faktorisiert

    In Kap. 11 haben wir mehrere Faktorisierungsmethoden beschrieben. Jede davon wird bei einigen Ganzzahlen erfolgreich sein, aber keine davon ist eine...
    Chapter 2024
  7. Elliptische Kurven

    Elliptische Kurven sind eines der eleganteren Objekte in der Algebra. Ein Hintergrundwissen über die zugrunde liegende Arithmetik von Kurven ist für...
    Chapter 2024
  8. Elliptische Kurven Kryptographie

    Das erste vorgeschlagene asymmetrische Verschlüsselungsschema war das von Rivest, Shamir und Adleman, das die Exponentiation in der Gruppe der...
    Chapter 2024
  9. Gitterbasierte Kryptographie und NTRU

    Mit der Veröffentlichung von Peter Shors bahnbrechendem Artikel, dass das Faktorisieren und diskrete Logarithmenberechnungen auf einem...
    Chapter 2024
  10. Optimally-Fair Multi-party Exchange Without Trusted Parties

    We present a multi-party exchange protocol that achieves optimal partial fairness even in the presence of a dishonest majority. We demonstrate how...
    Ivo Maffei, A. W. Roscoe in Computer Security – ESORICS 2023
    Conference paper Open access 2024
  11. Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience

    Deniable encryption (Canetti et al. in CRYPTO ’97) is an intriguing primitive, which provides security guarantee against coercion by allowing a...
    Zhiyuan An, Haibo Tian, ... Fangguo Zhang in Computer Security – ESORICS 2023
    Conference paper 2024
  12. Covercrypt: An Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE

    Attribute-Based Encryption (ABE) is a very attractive primitive to limit access according to specific rights. While very powerful instantiations have...
    Théophile Brézot, Paola de Perthuis, David Pointcheval in Computer Security – ESORICS 2023
    Conference paper 2024
  13. Consolidation of Ground Truth Sets for Weakness Detection in Smart Contracts

    Smart contracts are small programs on the blockchain that often handle valuable assets. Vulnerabilities in smart contracts can be costly, as time has...
    Conference paper 2024
  14. Short Squeeze in DeFi Lending Market: Decentralization in Jeopardy?

    Anxiety levels in the Aave community spiked in November 2022 as Avi Eisenberg performed an attack on Aave. Eisenberg attempted to short the CRV token...
    Lioba Heimbach, Eric Schertenleib, Roger Wattenhofer in Financial Cryptography and Data Security. FC 2023 International Workshops
    Conference paper 2024
  15. Overstatement-Net-Equivalent Risk-Limiting Audit: ONEAudit

    A procedure is a risk-limiting audit (RLA) with risk limit \(\alpha \)...
    Conference paper 2024
  16. Uniswap Liquidity Provision: An Online Learning Approach

    Uniswap v3 is a decentralized exchange (DEX) that allows liquidity providers to allocate funds more efficiently by specifying an active price...
    Conference paper 2024
  17. The Principal–Agent Problem in Liquid Staking

    Proof-of-stake systems require stakers to lock up their funds in order to participate in consensus validation. This leads to capital inefficiency, as...
    Conference paper 2024
  18. The Good, the Bad and the Submodular: Fairly Allocating Mixed Manna Under Order-Neutral Submodular Preferences

    We study the problem of fairly allocating indivisible goods (positively valued items) and chores (negatively valued items) among agents with...
    Cyrus Cousins, Vignesh Viswanathan, Yair Zick in Web and Internet Economics
    Conference paper 2024
  19. Online Nash Welfare Maximization Without Predictions

    The maximization of Nash welfare, which equals the geometric mean of agents’ utilities, is widely studied because it balances efficiency and fairness...
    Zhiyi Huang, Minming Li, ... Tianze Wei in Web and Internet Economics
    Conference paper 2024
  20. One Quarter Each (on Average) Ensures Proportionality

    We consider the problem of fair allocation of m indivisible items to a group of n agents with subsidy (money). Our work mainly focuses on the...
    **aowei Wu, Cong Zhang, Shengwei Zhou in Web and Internet Economics
    Conference paper 2024
Did you find what you were looking for? Share feedback.