scholarly journals Rationality and Adversarial Behavior in Multi-party Computation

Author(s):  
Anna Lysyanskaya ◽  
Nikos Triandopoulos
Keyword(s):  
Author(s):  
Emmanuelle Anceaume ◽  
Francisco Brasileiro ◽  
Romaric Ludinard ◽  
Bruno Sericola ◽  
Frederic Tronel

Author(s):  
Luca de Alfaro ◽  
Vassilis Polychronopoulos ◽  
Neoklis Polyzotis

We focus on the problem of obtaining top-k lists of items from larger itemsets, using human workers for doing comparisons among items.An example application is short-listing a large set of college applications using advanced students as workers. We describe novel efficient techniques and explore their tolerance to adversarial behavior and the tradeoffs among different measures of performance (latency, expense and quality of results). We empirically evaluate the proposed techniques against prior art using simulations as well as real crowds in Amazon Mechanical Turk. A randomized variant of the proposed algorithms achieves significant budget saves, especially for very large itemsets and large top-k lists, with negligible risk of lowering the quality of the output.


2020 ◽  
Vol 2020 (3) ◽  
pp. 384-403
Author(s):  
Camille Cobb ◽  
Lucy Simko ◽  
Tadayoshi Kohno ◽  
Alexis Hiniker

AbstractOnline status indicators (or OSIs, i.e., interface elements that communicate whether a user is online) can leak potentially sensitive information about users. In this work, we analyze 184 mobile applications to systematically characterize the existing design space of OSIs. We identified 40 apps with OSIs across a variety of genres and conducted a design review of the OSIs in each, examining both Android and iOS versions of these apps. We found that OSI design decisions clustered into four major categories, namely: appearance, audience, settings, and fidelity to actual user behavior. Less than half of these apps allow users change the default settings for OSIs. Informed by our findings, we discuss: 1) how these design choices support adversarial behavior, 2) design guidelines for creating consistent, privacy-conscious OSIs, and 3) a set of novel design concepts for building future tools to augment users’ ability to control and understand the presence information they broadcast. By connecting the common design patterns we document to prior work on privacy in social technologies, we contribute an empirical understanding of the systematic ways in which OSIs can make users more or less vulnerable to unwanted information disclosure.


2011 ◽  
Vol 58 (3) ◽  
pp. 255-280 ◽  
Author(s):  
Shawn C. McKay ◽  
Alok Chaturvedi ◽  
Douglas E. Adams
Keyword(s):  

Risk Analysis ◽  
2016 ◽  
Vol 37 (3) ◽  
pp. 459-470 ◽  
Author(s):  
Hamid Mohtadi
Keyword(s):  

Author(s):  
Kyle D Christensen ◽  
Peter Dobias

This work reviews the development and tests of an intermediate force capability (IFC) concept development hybrid wargame aimed at examining a maritime task force’s ability to counter hybrid threats in the gray zone. IFCs offer a class of response between doing nothing and using lethal force in a situation that would be politically unpalatable. Thus, the aim of the wargame is to evaluate whether IFCs can make a difference to mission success against hybrid threats in the gray zone. This wargame series was particularly important because it used traditional game mechanics in a unique and innovative way to evaluate and assess IFCs. The results of the wargame demonstrated that IFCs have a high probability of filling the gap between doing nothing and using lethal force. The presence of IFCs provided engagement time and space for the maritime task force commander. It also identified that development of robust IFC capabilities, not only against personnel, but against systems (trucks, cars, UAVs, etc.), can also effectively counter undesirable adversarial behavior


Sign in / Sign up

Export Citation Format

Share Document