Skip to main content

Showing 1–35 of 35 results for author: Singh, M P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.02269  [pdf, other

    cs.CL cs.AI

    Extracting Norms from Contracts Via ChatGPT: Opportunities and Challenges

    Authors: Amanul Haque, Munindar P. Singh

    Abstract: We investigate the effectiveness of ChatGPT in extracting norms from contracts. Norms provide a natural way to engineer multiagent systems by capturing how to govern the interactions between two or more autonomous parties. We extract norms of commitment, prohibition, authorization, and power, along with associated norm elements (the parties involved, antecedents, and consequents) from contracts. O… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

    Comments: Accepted at COINE-AAMAS 2024

  2. Information Security and Privacy in the Digital World: Some Selected Topics

    Authors: Jaydip Sen, Joceli Mayer, Subhasis Dasgupta, Subrata Nandi, Srinivasan Krishnaswamy, Pinaki Mitra, Mahendra Pratap Singh, Naga Prasanthi Kundeti, Chandra Sekhara Rao MVP, Sudha Sree Chekuri, Seshu Babu Pallapothu, Preethi Nanjundan, Jossy P. George, Abdelhadi El Allahi, Ilham Morino, Salma AIT Oussous, Siham Beloualid, Ahmed Tamtaoui, Abderrahim Bajit

    Abstract: In the era of generative artificial intelligence and the Internet of Things, while there is explosive growth in the volume of data and the associated need for processing, analysis, and storage, several new challenges are faced in identifying spurious and fake information and protecting the privacy of sensitive data. This has led to an increasing demand for more robust and resilient schemes for aut… ▽ More

    Submitted 29 March, 2024; originally announced April 2024.

    Comments: Published by IntechOpen, London Uk in Nov 2023, the book contains 8 chapters spanning over 131 pages. arXiv admin note: text overlap with arXiv:2307.02055, arXiv:2304.00258

  3. arXiv:2402.06023  [pdf, other

    cs.LG cs.AI cs.GT

    Decision Theory-Guided Deep Reinforcement Learning for Fast Learning

    Authors: Zelin Wan, **-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles Kamhoua, Munindar P. Singh

    Abstract: This paper introduces a novel approach, Decision Theory-guided Deep Reinforcement Learning (DT-guided DRL), to address the inherent cold start problem in DRL. By integrating decision theory principles, DT-guided DRL enhances agents' initial performance and robustness in complex environments, enabling more efficient and reliable convergence during learning. Our investigation encompasses two primary… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

  4. arXiv:2401.16461  [pdf, other

    cs.MA cs.AI cs.LG

    Norm Enforcement with a Soft Touch: Faster Emergence, Happier Agents

    Authors: Sz-Ting Tzeng, Nirav Ajmeri, Munindar P. Singh

    Abstract: A multiagent system is a society of autonomous agents whose interactions can be regulated via social norms. In general, the norms of a society are not hardcoded but emerge from the agents' interactions. Specifically, how the agents in a society react to each other's behavior and respond to the reactions of others determines which norms emerge in the society. We think of these reactions by an agent… ▽ More

    Submitted 5 March, 2024; v1 submitted 29 January, 2024; originally announced January 2024.

    Comments: 12 pages, 11 figures, 5 tables (and supplementary material with code availability and additional results), accepted at AAMAS 2024

  5. arXiv:2310.19268  [pdf, other

    cs.SI cs.CL cs.CY

    Moral Sparks in Social Media Narratives

    Authors: Ruijie Xi, Munindar P. Singh

    Abstract: There is increasing interest in building computational models of moral reasoning by people to enable effective interaction by Artificial Intelligence (AI) agents. We examine interactions on social media to understand human moral judgments in real-life ethical scenarios. Specifically, we examine posts from a popular Reddit subreddit (i.e., a subcommunity) called r/AmITheAsshole, where authors and c… ▽ More

    Submitted 21 April, 2024; v1 submitted 30 October, 2023; originally announced October 2023.

  6. arXiv:2306.03316  [pdf, other

    cs.CL

    CoSiNES: Contrastive Siamese Network for Entity Standardization

    Authors: Jiaqing Yuan, Michele Merler, Mihir Choudhury, Raju Pavuluri, Munindar P. Singh, Maja Vukovic

    Abstract: Entity standardization maps noisy mentions from free-form text to standard entities in a knowledge base. The unique challenge of this task relative to other entity-related tasks is the lack of surrounding context and numerous variations in the surface form of the mentions, especially when it comes to generalization across domains where labeled data is scarce. Previous research mostly focuses on de… ▽ More

    Submitted 5 June, 2023; originally announced June 2023.

    Comments: Accepted by Matching Workshop at ACL2023

  7. arXiv:2303.12808  [pdf, other

    cs.CL cs.AI

    PACO: Provocation Involving Action, Culture, and Oppression

    Authors: Vaibhav Garg, Ganning Xu, Munindar P. Singh

    Abstract: In India, people identify with a particular group based on certain attributes such as religion. The same religious groups are often provoked against each other. Previous studies show the role of provocation in increasing tensions between India's two prominent religious groups: Hindus and Muslims. With the advent of the Internet, such provocation also surfaced on social media platforms such as What… ▽ More

    Submitted 19 March, 2023; originally announced March 2023.

  8. arXiv:2303.11184  [pdf, other

    cs.CL

    Conversation Modeling to Predict Derailment

    Authors: Jiaqing Yuan, Munindar P. Singh

    Abstract: Conversations among online users sometimes derail, i.e., break down into personal attacks. Such derailment has a negative impact on the healthy growth of cyberspace communities. The ability to predict whether ongoing conversations are likely to derail could provide valuable real-time insight to interlocutors and moderators. Prior approaches predict conversation derailment retrospectively without t… ▽ More

    Submitted 20 March, 2023; originally announced March 2023.

  9. arXiv:2303.10795  [pdf, other

    cs.CR

    iRogue: Identifying Rogue Behavior from App Reviews

    Authors: Vaibhav Garg, Hui Guo, Nirav Ajmeri, Saikath Bhattacharya, Munindar P. Singh

    Abstract: An app user can access information of other users or third parties. We define rogue mobile apps as those that enable a user (abuser) to access information of another user or third party (victim), in a way that violates the victim's privacy expectations. Such apps are dual-use and their identification is nontrivial. We propose iRogue, an approach for identifying rogue apps based on their reviews, p… ▽ More

    Submitted 19 March, 2023; originally announced March 2023.

  10. arXiv:2303.10573  [pdf, other

    cs.CL

    Extracting Incidents, Effects, and Requested Advice from MeToo Posts

    Authors: Vaibhav Garg, Jiaqing Yuan, Rujie Xi, Munindar P. Singh

    Abstract: Survivors of sexual harassment frequently share their experiences on social media, revealing their feelings and emotions and seeking advice. We observed that on Reddit, survivors regularly share long posts that describe a combination of (i) a sexual harassment incident, (ii) its effect on the survivor, including their feelings and emotions, and (iii) the advice being sought. We term such posts MeT… ▽ More

    Submitted 19 March, 2023; originally announced March 2023.

  11. The blame game: Understanding blame assignment in social media

    Authors: Ruijie Xi, Munindar P. Singh

    Abstract: Cognitive and psychological studies on morality have proposed underlying linguistic and semantic factors. However, laboratory experiments in the philosophical literature often lack the nuances and complexity of real life. This paper examines how well the findings of these cognitive studies generalize to a corpus of over 30,000 narratives of tense social situations submitted to a popular social med… ▽ More

    Submitted 26 February, 2023; originally announced February 2023.

    Comments: Submitted to ICWSM 2022

  12. arXiv:2302.12806  [pdf, other

    cs.SI

    Morality in the mundane: Categorizing moral reasoning in real-life social situations

    Authors: Ruijie Xi, Munindar P. Singh

    Abstract: Moral reasoning reflects how people acquire and apply moral rules in particular situations. With increasingly social interactions happening online, social media data provides an unprecedented opportunity to assess in-the-wild moral reasoning. We investigate the commonsense aspects of morality in ordinary matters empirically. To this end, we examine data from a Reddit subcommunity (i.e., a subreddi… ▽ More

    Submitted 26 July, 2023; v1 submitted 24 February, 2023; originally announced February 2023.

    Comments: Accepted by THE 18TH INTERNATIONAL AAAI CONFERENCE ON WEB AND SOCIAL MEDIA (ICWSM2024)

  13. arXiv:2208.03789  [pdf, other

    cs.MA cs.AI cs.LG

    Socially Intelligent Genetic Agents for the Emergence of Explicit Norms

    Authors: Rishabh Agrawal, Nirav Ajmeri, Munindar P. Singh

    Abstract: Norms help regulate a society. Norms may be explicit (represented in structured form) or implicit. We address the emergence of explicit norms by develo** agents who provide and reason about explanations for norm violations in deciding sanctions and identifying alternative norms. These agents use a genetic algorithm to produce norms and reinforcement learning to learn the values of these norms. W… ▽ More

    Submitted 7 August, 2022; originally announced August 2022.

    Comments: 7 pages, 2 figures, 12 tables, accepted at IJCAI 2022 (and supplementary material with code availability and additional results)

  14. arXiv:2203.11420  [pdf, ps, other

    cs.AI cs.CY

    Consent as a Foundation for Responsible Autonomy

    Authors: Munindar P. Singh

    Abstract: This paper focuses on a dynamic aspect of responsible autonomy, namely, to make intelligent agents be responsible at run time. That is, it considers settings where decision making by agents im**es upon the outcomes perceived by other agents. For an agent to act responsibly, it must accommodate the desires and other attitudes of its users and, through other agents, of their users. The contribut… ▽ More

    Submitted 21 March, 2022; originally announced March 2022.

    Comments: 6 pages; 1 table Proceedings of the 36th AAAI Conference on Artificial Intelligence (AAAI), Blue Sky Track

    Journal ref: Proceedings of the 36th AAAI Conference on Artificial Intelligence (AAAI), Blue Sky Track, 2022

  15. arXiv:2203.00086  [pdf, ps, other

    cs.MA

    Pippi: Practical Protocol Instantiation

    Authors: Samuel H. Christie V, Amit K. Chopra, Munindar P. Singh

    Abstract: A protocol specifies interactions between roles, which together constitute a multiagent system (MAS). Enacting a protocol presupposes that agents are bound to the its roles. Existing protocol-based approaches, however, do not adequately treat the practical aspects of how roles bindings come about. Pippi addresses this problem of MAS instantiation. It proposes the notion of a metaprotocol, enacti… ▽ More

    Submitted 28 February, 2022; originally announced March 2022.

    Comments: 8 pages, to be published in Proc. of the 21st International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2022), Online

  16. arXiv:2202.02574  [pdf, other

    cs.MA cs.SE

    Governance of Autonomous Agents on the Web: Challenges and Opportunities

    Authors: Timotheus Kampik, Adnane Mansour, Olivier Boissier, Sabrina Kirrane, Julian Padget, Terry R. Payne, Munindar P. Singh, Valentina Tamma, Antoine Zimmermann

    Abstract: The study of autonomous agents has a long tradition in the Multiagent Systems and the Semantic Web communities, with applications ranging from automating business processes to personal assistants. More recently, the Web of Things (WoT), which is an extension of the Internet of Things (IoT) with metadata expressed in Web standards, and its community provide further motivation for pushing the autono… ▽ More

    Submitted 5 February, 2022; originally announced February 2022.

    Comments: Manuscript accepted for publication in ACM Transactions on Internet Technology

  17. arXiv:2104.15034  [pdf, other

    cs.AI cs.MA

    Noe: Norms Emergence and Robustness Based on Emotions in Multiagent Systems

    Authors: Sz-Ting Tzeng, Nirav Ajmeri, Munindar P. Singh

    Abstract: Social norms characterize collective and acceptable group conducts in human society. Furthermore, some social norms emerge from interactions of agents or humans. To achieve agent autonomy and make norm satisfaction explainable, we include emotions into the normative reasoning process, which evaluates whether to comply or violate a norm. Specifically, before selecting an action to execute, an agent… ▽ More

    Submitted 7 May, 2022; v1 submitted 30 April, 2021; originally announced April 2021.

    Comments: 17 pages with 7 figures. Accepted at COINE 2021

  18. arXiv:2104.08355  [pdf, other

    cs.MA

    Hercule: Representing and Reasoning about Norms as a Foundation for Declarative Contracts over Blockchain

    Authors: Samuel H. Christie V, Amit K. Chopra, Munindar P. Singh

    Abstract: Current blockchain approaches for business contracts are based on smart contracts, namely, software programs placed on a blockchain that are automatically executed to realize a contract. However, smart contracts lack flexibility and interfere with the autonomy of the parties concerned. We propose Hercule, an approach for declaratively specifying blockchain applications in a manner that reflects… ▽ More

    Submitted 16 April, 2021; originally announced April 2021.

  19. Toward a Rational and Ethical Sociotechnical System of Autonomous Vehicles: A Novel Application of Multi-Criteria Decision Analysis

    Authors: Veljko Dubljević, George F. List, Jovan Milojevich, Nirav Ajmeri, William Bauer, Munindar P. Singh, Eleni Bardaka, Thomas Birkland, Charles Edwards, Roger Mayer, Ioan Muntean, Thomas Powers, Hesham Rakha, Vance Ricks, M. Shoaib Samandar

    Abstract: The expansion of artificial intelligence (AI) and autonomous systems has shown the potential to generate enormous social good while also raising serious ethical and safety concerns. AI technology is increasingly adopted in transportation. A survey of various in-vehicle technologies found that approximately 64% of the respondents used a smartphone application to assist with their travel. The top-us… ▽ More

    Submitted 4 February, 2021; originally announced February 2021.

  20. arXiv:2101.11775  [pdf, ps, other

    cs.CY cs.AI

    Moral and Social Ramifications of Autonomous Vehicles

    Authors: Veljko Dubljević, Sean Douglas, Jovan Milojevich, Nirav Ajmeri, William A. Bauer, George F. List, Munindar P. Singh

    Abstract: Autonomous Vehicles (AVs) raise important social and ethical concerns, especially about accountability, dignity, and justice. We focus on the specific concerns arising from how AV technology will affect the lives and livelihoods of professional and semi-professional drivers. Whereas previous studies of such concerns have focused on the opinions of experts, we seek to understand these ethical and s… ▽ More

    Submitted 29 January, 2021; v1 submitted 27 January, 2021; originally announced January 2021.

  21. arXiv:2101.10121  [pdf, ps, other

    cs.CR cs.GT cs.LG

    Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey

    Authors: Mu Zhu, Ahmed H. Anwar, Zelin Wan, **-Hee Cho, Charles Kamhoua, Munindar P. Singh

    Abstract: Defensive deception is a promising approach for cyber defense. Via defensive deception, the defender can anticipate attacker actions; it can mislead or lure attacker, or hide real resources. Although defensive deception is increasingly popular in the research community, there has not been a systematic investigation of its key components, the underlying principles, and its tradeoffs in various prob… ▽ More

    Submitted 8 May, 2021; v1 submitted 21 January, 2021; originally announced January 2021.

    Comments: 37 pages, 184 citations

  22. arXiv:2101.02863  [pdf, other

    cs.GT

    Foureye: Defensive Deception based on Hypergame Theory Against Advanced Persistent Threats

    Authors: Zelin Wan, **-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles Kamhoua, Munindar P. Singh

    Abstract: Defensive deception techniques have emerged as a promising proactive defense mechanism to mislead an attacker and thereby achieve attack failure. However, most game-theoretic defensive deception approaches have assumed that players maintain consistent views under uncertainty. They do not consider players' possible, subjective beliefs formed due to asymmetric information given to them. In this work… ▽ More

    Submitted 30 January, 2021; v1 submitted 8 January, 2021; originally announced January 2021.

    Comments: Main paper: 12 pages, 8 figures. Appendix: 7 pages, 17 figures

  23. arXiv:2012.14581  [pdf, other

    cs.MA cs.AI

    Prosocial Norm Emergence in Multiagent Systems

    Authors: Mehdi Mashayekhi, Nirav Ajmeri, George F. List, Munindar P. Singh

    Abstract: Multiagent systems provide a basis for develo** systems of autonomous entities and thus find application in a variety of domains. We consider a setting where not only the member agents are adaptive but also the multiagent system viewed as an entity in its own right is adaptive. Specifically, the social structure of a multiagent system can be reflected in the social norms among its members. It is… ▽ More

    Submitted 4 May, 2022; v1 submitted 28 December, 2020; originally announced December 2020.

    Comments: 20 pages, 8 figures

  24. arXiv:2004.13150  [pdf, other

    cs.CL

    Octa: Omissions and Conflicts in Target-Aspect Sentiment Analysis

    Authors: Zhe Zhang, Chung-Wei Hang, Munindar P. Singh

    Abstract: Sentiments in opinionated text are often determined by both aspects and target words (or targets). We observe that targets and aspects interrelate in subtle ways, often yielding conflicting sentiments. Thus, a naive aggregation of sentiments from aspects and targets treated separately, as in existing sentiment analysis models, impairs performance. We propose Octa, an approach that jointly consid… ▽ More

    Submitted 6 October, 2020; v1 submitted 27 April, 2020; originally announced April 2020.

    Comments: Accepted by Findings of EMNLP 2020

  25. arXiv:2003.11170  [pdf, other

    cs.MA cs.CR

    Norms and Sanctions as a Basis for Promoting Cybersecurity Practices

    Authors: Nirav Ajmeri, Shubham Goyal, Munindar P. Singh

    Abstract: Many cybersecurity breaches occur due to users not following good cybersecurity practices, chief among them being regulations for applying software patches to operating systems, updating applications, and maintaining strong passwords. We capture cybersecurity expectations on users as norms. We empirically investigate sanctioning mechanisms in promoting compliance with those norms as well as the… ▽ More

    Submitted 24 March, 2020; originally announced March 2020.

    Comments: 10 pages, 4 figures

  26. arXiv:2002.09069  [pdf, other

    cs.CR cs.GT

    Optimizing Vulnerability-Driven Honey Traffic Using Game Theory

    Authors: Iffat Anjum, Mohammad Sujan Miah, Mu Zhu, Nazia Sharmin, Christopher Kiekintveld, William Enck, Munindar P Singh

    Abstract: Enterprises are increasingly concerned about adversaries that slowly and deliberately exploit resources over the course of months or even years. A key step in this kill chain is network reconnaissance, which has historically been active (e.g., network scans) and therefore detectable. However, new networking technology increases the possibility of passive network reconnaissance, which will be large… ▽ More

    Submitted 20 February, 2020; originally announced February 2020.

    Journal ref: AAAI Workshop on Artificial Intelligence for Cyber Security (AICS), 2020

  27. Leveraging Structural and Semantic Correspondence for Attribute-Oriented Aspect Sentiment Discovery

    Authors: Zhe Zhang, Munindar P. Singh

    Abstract: Opinionated text often involves attributes such as authorship and location that influence the sentiments expressed for different aspects. We posit that structural and semantic correspondence is both prevalent in opinionated text, especially when associated with attributes, and crucial in accurately revealing its latent aspect and sentiment structure. However, it is not recognized by existing appro… ▽ More

    Submitted 28 August, 2019; originally announced August 2019.

    Comments: EMNLP 2019

  28. arXiv:1901.08441  [pdf, ps, other

    cs.SE

    An Evaluation of Communication Protocol Languages for Engineering Multiagent Systems

    Authors: Amit K. Chopra, Samuel H. Christie V, Munindar P. Singh

    Abstract: Communication protocols are central to engineering decentralized multiagent systems. Modern protocol languages are typically formal and address aspects of decentralization, such as asynchrony. However, modern languages differ in important ways in their basic abstractions and operational assumptions. This diversity makes a comparative evaluation of protocol languages a challenging task. We contri… ▽ More

    Submitted 4 August, 2020; v1 submitted 24 January, 2019; originally announced January 2019.

    ACM Class: D.3.0; D.2.11; I.2.11

  29. arXiv:1801.02672  [pdf, ps, other

    cs.CY cs.MA

    Violable Contracts and Governance for Blockchain Applications

    Authors: Munindar P. Singh, Amit K. Chopra

    Abstract: We examine blockchain technologies, especially smart contracts, as a platform for decentralized applications. By providing a basis for consensus, blockchain promises to upend business models that presuppose a central authority. However, blockchain suffers from major shortcomings arising from an over-regimented way of organizing computation that limits its prospects. We propose a sociotechnical, ye… ▽ More

    Submitted 8 January, 2018; originally announced January 2018.

  30. Tosca: Operationalizing Commitments Over Information Protocols

    Authors: Thomas C. King, Akın Günay, Amit K. Chopra, Munindar P. Singh

    Abstract: The notion of commitment is widely studied as a high-level abstraction for modeling multiagent interaction. An important challenge is supporting flexible decentralized enactments of commitment specifications. In this paper, we combine recent advances on specifying commitments and information protocols. Specifically, we contribute Tosca, a technique for automatically synthesizing information protoc… ▽ More

    Submitted 10 August, 2017; originally announced August 2017.

  31. arXiv:1704.03610  [pdf, other

    cs.SE

    Blockchains for Business Process Management - Challenges and Opportunities

    Authors: Jan Mendling, Ingo Weber, Wil van der Aalst, Jan vom Brocke, Cristina Cabanillas, Florian Daniel, Soren Debois, Claudio Di Ciccio, Marlon Dumas, Schahram Dustdar, Avigdor Gal, Luciano Garcia-Banuelos, Guido Governatori, Richard Hull, Marcello La Rosa, Henrik Leopold, Frank Leymann, Jan Recker, Manfred Reichert, Hajo A. Reijers, Stefanie Rinderle-Ma, Andreas Rogge-Solti, Michael Rosemann, Stefan Schulte, Munindar P. Singh , et al. (7 additional authors not shown)

    Abstract: Blockchain technology promises a sizable potential for executing inter-organizational business processes without requiring a central party serving as a single point of trust (and failure). This paper analyzes its impact on business process management (BPM). We structure the discussion using two BPM frameworks, namely the six BPM core capabilities and the BPM lifecycle. This paper provides research… ▽ More

    Submitted 31 January, 2018; v1 submitted 11 April, 2017; originally announced April 2017.

    Comments: Preprint for ACM TMIS

  32. arXiv:1605.09021  [pdf, other

    cs.DC

    A survey of systems for massive stream analytics

    Authors: Maninder Pal Singh, Mohammad A. Hoque, Sasu Tarkoma

    Abstract: The immense growth of data demands switching from traditional data processing solutions to systems, which can process a continuous stream of real time data. Various applications employ stream processing systems to provide solutions to emerging Big Data problems. Open-source solutions such as Storm, Spark Streaming, and S4 are the attempts to answer key stream processing questions. The recent intro… ▽ More

    Submitted 4 June, 2016; v1 submitted 29 May, 2016; originally announced May 2016.

  33. A Probabilistic Approach for Maintaining Trust Based on Evidence

    Authors: Yonghong Wang, Chung-Wei Hang, Munindar P. Singh

    Abstract: Leading agent-based trust models address two important needs. First, they show how an agent may estimate the trustworthiness of another agent based on prior interactions. Second, they show how agents may share their knowledge in order to cooperatively assess the trustworthiness of others. However, in real-life settings, information relevant to trust is usually obtained piecemeal, not all at onc… ▽ More

    Submitted 16 January, 2014; originally announced January 2014.

    Journal ref: Journal Of Artificial Intelligence Research, Volume 40, pages 221-267, 2011

  34. arXiv:1211.4123  [pdf, ps, other

    cs.SE cs.MA

    Interaction-Oriented Software Engineering: Concepts and Principles

    Authors: Amit K. Chopra, Munindar P. Singh

    Abstract: Following established tradition, software engineering today is rooted in a conceptually centralized way of thinking. The primary SE artifact is a specification of a machine -- a computational artifact -- that would meet the (elicited and) stated requirements. Therein lies a fundamental mismatch with (open) sociotechnical systems, which involve multiple autonomous social participants or principals… ▽ More

    Submitted 17 November, 2012; originally announced November 2012.

    ACM Class: H.1.0; D.2.1; I.2.11

  35. Anonymity and verifiability in multi-attribute reverse auction

    Authors: T. R. Srinath, Mahendra Pratap Singh, Alwyn Roshan Pais

    Abstract: The use of e-Auction services has been increasing in recent years. Security requirements in conducting e-Auctions are mainly bid privacy, anonymity and public verifiability. Most of the secure protocols concentrate on privacy and anonymity, which are achieved through bidder-resolved multi-party computation, assuming two or more trusted third parties, either through numerous auctioneers or with asy… ▽ More

    Submitted 2 September, 2011; originally announced September 2011.

    Comments: 9 pages, 1 figure and 2 tables

    Journal ref: International Journal of Information Technology Convergence and Services (IJITCS) Vol.1, No.4, August 2011