Feigenbaum

Results: 121



#Item
51Privacy / Data security / Copyright law / Cryptography / Identity management / P3P / Digital rights management / Personally identifiable information / Internet privacy / Digital Copyright / Digital Millennium Copyright Act / Information security

Towards Realistic Assumptions, Models, and Goals for Security Research (White Paper for NSF Workshop) Joan Feigenbaum

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2002-05-22 10:45:19
52Complexity classes / PSPACE-complete / IP / Generalized geography / PSPACE / PP / ArthurMerlin protocol / Computational complexity theory / NP / P / NEXPTIME / Reduction

1 Doc. Math. J. DMV Games, Complexity Classes, and Approximation Algorithms Joan Feigenbaum

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2001-10-24 10:52:24
53Cryptography / Secure multi-party computation / Secret sharing / Cryptographic protocol / Communications protocol

Systematizing Secure Computation for Research and Decision Support Jason Perry, Debayan Gupta, Joan Feigenbaum and Rebecca N. Wright Rutgers University, Yale University

Add to Reading List

Source URL: paul.rutgers.edu

Language: English - Date: 2014-09-07 12:36:30
54Routing protocols / Routing algorithms / Routing / Edsger W. Dijkstra / Border Gateway Protocol / Strategyproofness / Shortest path problem / Routing loop problem / Link-state routing protocol

A BGP-based Mechanism for Lowest-Cost Routing∗ † Joan Feigenbaum ‡

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2002-08-12 09:52:11
55Accountability / Data security / National security / Digital rights / Human rights / Privacy / Internet privacy / Governance / Personally identifiable information / Medical privacy / Punishment / Computer security

Accountability and Deterrence in Online Life (Extended Abstract) Joan Feigenbaum James A. Hendler

Add to Reading List

Source URL: www.websci11.org

Language: English - Date: 2016-03-15 09:54:21
56Market / Financial markets / Rational expectations / Auction theory / Economic equilibrium / Economics / Efficient-market hypothesis / Futures contract / Paul Milgrom / Competitive equilibrium

Computation in a Distributed Information Market 1 Joan Feigenbaum a,2 a Yale University,Department of Computer Science, New Haven, CT 06520

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2004-05-05 13:12:13
57Quantum complexity theory / Computational complexity theory / Cryptography / Functions and mappings / Secure multi-party computation / Secure two-party computation / Communication complexity / Limit of a function / Pi / Cryptographic protocol / PP / Approximation algorithm

Secure Multiparty Computation of Approximations∗ Joan Feigenbaum† Yuval Ishai‡ Martin J. Straussk

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2006-09-25 10:55:42
58

Brief Announcement: On the Resilience of Routing Tables Joan Feigenbaum Brighten Godfrey

Add to Reading List

Source URL: people.inf.ethz.ch

Language: English - Date: 2012-05-25 18:45:59
    59

    On the Resilience of Routing Tables arXiv:1207.3732v2 [cs.DC] 4 Aug 2012 Joan Feigenbaum (Yale), Brighten Godfrey (UIUC), Aurojit Panda (UC Berkeley), Michael Schapira (Hebrew University), Scott Shenker (UC Berkeley), A

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2012-08-06 20:17:27
      60

      James Feigenbaum Abstract When acquiring information about potential buyers is costly, sellers will be unable to make the best possible match. We capture the consequences of this in a model where producers make investmen

      Add to Reading List

      Source URL: www.histproj.org

      Language: English - Date: 2013-06-20 13:52:22
        UPDATE