نتایج جستجو برای: cheating

تعداد نتایج: 2423  

2012
Gilad Asharov Claudio Orlandi

We introduce the notion of covert security with public verifiability, building on the covert security model introduced by Aumann and Lindell (TCC 2007). Protocols that satisfy covert security guarantee that the honest parties involved in the protocol will notice any cheating attempt with some constant probability . The idea behind the model is that the fear of being caught cheating will be enou...

2008
Sachin Goyal John Carter

We are building a system that harnesses the idle resources (cpu, storage, and bandwidth) of nodes (e.g., home desktops) distributed across the Internet to build useful distributed services like content distribution or remote backup. Users are compensated in return for contributing their nodes’ idle resources to the system. Collective managers bundle and manage the contributed resources and rese...

Journal: :Journal of Economic Behavior & Organization 2020

Journal: :Behavior Research Methods, Instruments, & Computers 1992

Journal: :Journal of Information Technology Education: Discussion Cases 2013

Journal: :PLoS ONE 2008

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید