Bultel, Xavier; Dreier, Jannik; Dumas, Jean-Guillaume; Lafourcade, Pascal A faster cryptographer’s Conspiracy Santa. (English) Zbl 1453.68081 Theor. Comput. Sci. 839, 122-134 (2020). MSC: 68Q10 68P27 68Q17 68Q25 91A12 91A68 94A60 PDF BibTeX XML Cite \textit{X. Bultel} et al., Theor. Comput. Sci. 839, 122--134 (2020; Zbl 1453.68081) Full Text: DOI
Mengibaev, Ulugbek; Jia, Xiaodan; Ma, Yeqing The impact of interactive dependence on privacy protection behavior based on evolutionary game. (English) Zbl 07200791 Appl. Math. Comput. 379, Article ID 125231, 6 p. (2020). Reviewer: Yilun Shang (Newcastle) MSC: 91D30 91A22 91A80 PDF BibTeX XML Cite \textit{U. Mengibaev} et al., Appl. Math. Comput. 379, Article ID 125231, 6 p. (2020; Zbl 07200791) Full Text: DOI
Konrad, Kai A. Attacking and defending multiple valuable secrets in a big data world. (English) Zbl 1431.91076 Eur. J. Oper. Res. 280, No. 3, 1122-1129 (2020). MSC: 91A80 PDF BibTeX XML Cite \textit{K. A. Konrad}, Eur. J. Oper. Res. 280, No. 3, 1122--1129 (2020; Zbl 1431.91076) Full Text: DOI
Meng, Weizhi (ed.); Furnell, Steven (ed.) Security and privacy in social networks and big data. 5th international symposium, SocialSec 2019, Copenhagen, Denmark, July 14–17, 2019. Revised selected papers. (English) Zbl 1430.68010 Communications in Computer and Information Science 1095. Singapore: Springer (ISBN 978-981-15-0757-1/pbk; 978-981-15-0758-8/ebook). xii, 276 p. (2019). MSC: 68-06 91-06 94-06 68P27 91D30 94A60 00B25 PDF BibTeX XML Cite \textit{W. Meng} (ed.) and \textit{S. Furnell} (ed.), Security and privacy in social networks and big data. 5th international symposium, SocialSec 2019, Copenhagen, Denmark, July 14--17, 2019. Revised selected papers. Singapore: Springer (2019; Zbl 1430.68010) Full Text: DOI
Krämer, Jan; Stüdlein, Nadine Data portability, data disclosure and data-induced switching costs: some unintended consequences of the general data protection regulation. (English) Zbl 1418.91285 Econ. Lett. 181, 99-103 (2019). MSC: 91B44 91A80 PDF BibTeX XML Cite \textit{J. Krämer} and \textit{N. Stüdlein}, Econ. Lett. 181, 99--103 (2019; Zbl 1418.91285) Full Text: DOI
Bultel, Xavier; Dreier, Jannik; Dumas, Jean-Guillaume; Lafourcade, Pascal A cryptographer’s Conspiracy Santa. (English) Zbl 1453.68080 Ito, Hiro (ed.) et al., 9th international conference on fun with algorithms, FUN 2018, June 13–15, 2018, La Maddalena Island, Italy. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 100, Article 13, 13 p. (2018). MSC: 68Q10 68P27 68Q17 68Q25 91A12 91A68 94A60 PDF BibTeX XML Cite \textit{X. Bultel} et al., LIPIcs -- Leibniz Int. Proc. Inform. 100, Article 13, 13 p. (2018; Zbl 1453.68080) Full Text: DOI
Li, Yanhui; Xu, Lu; Liu, Bailing Evolutionary game analysis on e-commerce personalization and privacy protection. (English) Zbl 1413.91014 Wuhan Univ. J. Nat. Sci. 23, No. 1, 17-24 (2018). MSC: 91A22 91B42 94A62 PDF BibTeX XML Cite \textit{Y. Li} et al., Wuhan Univ. J. Nat. Sci. 23, No. 1, 17--24 (2018; Zbl 1413.91014) Full Text: DOI
Ma, Rong; Feng, Shengyuan; Xiong, Jinbo; Jin, Biao; Wang, Lili Privacy protection method based on security game model. (Chinese. English summary) Zbl 1413.68048 J. Wuhan Univ., Nat. Sci. Ed. 64, No. 2, 165-174 (2018). MSC: 68P25 91A80 94A60 PDF BibTeX XML Cite \textit{R. Ma} et al., J. Wuhan Univ., Nat. Sci. Ed. 64, No. 2, 165--174 (2018; Zbl 1413.68048) Full Text: DOI
Augenblick, Ned; Bodoh-Creed, Aaron To reveal or not to reveal: privacy preferences and economic frictions. (English) Zbl 1400.91103 Games Econ. Behav. 110, 318-329 (2018). MSC: 91A28 91A05 PDF BibTeX XML Cite \textit{N. Augenblick} and \textit{A. Bodoh-Creed}, Games Econ. Behav. 110, 318--329 (2018; Zbl 1400.91103) Full Text: DOI
Wu, Yi-Chin; Raman, Vasumathi; Rawlings, Blake C.; Lafortune, Stéphane; Seshia, Sanjit A. Synthesis of obfuscation policies to ensure privacy and utility. (English) Zbl 1426.68085 J. Autom. Reasoning 60, No. 1, 107-131 (2018). MSC: 68P27 68Q45 68Q85 91A80 PDF BibTeX XML Cite \textit{Y.-C. Wu} et al., J. Autom. Reasoning 60, No. 1, 107--131 (2018; Zbl 1426.68085) Full Text: DOI
Rajtmajer, Sarah; Squicciarini, Anna; Such, Jose M.; Semonsen, Justin; Belmonte, Andrew An ultimatum game model for the evolution of privacy in jointly managed content. (English) Zbl 1453.91082 Rass, Stefan (ed.) et al., Decision and game theory for security. 8th international conference, GameSec 2017, Vienna, Austria, October 23–25, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10575, 112-130 (2017). MSC: 91D30 91A20 91A43 91A80 PDF BibTeX XML Cite \textit{S. Rajtmajer} et al., Lect. Notes Comput. Sci. 10575, 112--130 (2017; Zbl 1453.91082) Full Text: DOI
Gradwohl, Ronen; Smorodinsky, Rann Perception games and privacy. (English) Zbl 1393.91021 Games Econ. Behav. 104, 293-308 (2017). MSC: 91A28 PDF BibTeX XML Cite \textit{R. Gradwohl} and \textit{R. Smorodinsky}, Games Econ. Behav. 104, 293--308 (2017; Zbl 1393.91021) Full Text: DOI
Cummings, Rachel; Ligett, Katrina; Radhakrishnan, Jaikumar; Roth, Aaron; Wu, Zhiwei Steven Coordination complexity: small information coordinating large populations. (English) Zbl 1334.68094 Proceedings of the 7th ACM conference on innovations in theoretical computer science, ITCS’16, Cambridge, MA, USA, January 14–16, 2016. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-4057-1). 281-290 (2016). MSC: 68Q25 68R10 91A40 94A60 PDF BibTeX XML Cite \textit{R. Cummings} et al., in: Proceedings of the 7th ACM conference on innovations in theoretical computer science, ITCS'16, Cambridge, MA, USA, January 14--16, 2016. New York, NY: Association for Computing Machinery (ACM). 281--290 (2016; Zbl 1334.68094) Full Text: DOI arXiv
Blum, Avrim; Morgenstern, Jamie; Sharma, Ankit; Smith, Adam Privacy-preserving public information for sequential games. (English) Zbl 1364.91027 Proceedings of the 6th conference on innovations in theoretical computer science, ITCS’15, Rehovot, Israel, January 11–13, 2015. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-3333-7). 173-180 (2015). MSC: 91A20 91A43 91B32 PDF BibTeX XML Cite \textit{A. Blum} et al., in: Proceedings of the 6th conference on innovations in theoretical computer science, ITCS'15, Rehovot, Israel, January 11--13, 2015. New York, NY: Association for Computing Machinery (ACM). 173--180 (2015; Zbl 1364.91027) Full Text: DOI
Rajtmajer, Sarah; Griffin, Christopher; Squicciarini, Anna Determining a discrete set of site-constrained privacy options for users in social networks through Stackelberg games. (English) Zbl 1453.91081 Khouzani, MHR (ed.) et al., Decision and game theory for security. 6th international conference, GameSec 2015, London, UK, November 4–5, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9406, 208-227 (2015). MSC: 91D30 91A65 91A80 PDF BibTeX XML Cite \textit{S. Rajtmajer} et al., Lect. Notes Comput. Sci. 9406, 208--227 (2015; Zbl 1453.91081) Full Text: DOI
Kearns, Michael; Pai, Mallesh; Roth, Aaron; Ullman, Jonathan Mechanism design in large games: incentives and privacy (extended abstract). (English) Zbl 1364.91010 Proceedings of the 5th conference on innovations in theoretical computer science, ITCS’14, Princeton, NJ, USA, January 11–14, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2243-0). 403-409 (2014). MSC: 91A06 91B26 PDF BibTeX XML Cite \textit{M. Kearns} et al., in: Proceedings of the 5th conference on innovations in theoretical computer science, ITCS'14, Princeton, NJ, USA, January 11--14, 2014. New York, NY: Association for Computing Machinery (ACM). 403--409 (2014; Zbl 1364.91010) Full Text: DOI
Chen, Yiling; Sheffet, Or; Vadhan, Salil Privacy games. (English) Zbl 1404.91001 Liu, Tie-Yan (ed.) et al., Web and internet economics. 10th international conference, WINE 2014, Beijing, China, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13128-3/pbk). Lecture Notes in Computer Science 8877, 371-385 (2014). MSC: 91A05 91B26 PDF BibTeX XML Cite \textit{Y. Chen} et al., Lect. Notes Comput. Sci. 8877, 371--385 (2014; Zbl 1404.91001) Full Text: DOI
Xiao, David Is privacy compatible with truthfulness? (English) Zbl 1361.68076 Proceedings of the 4th conference on innovations in theoretical computer science, ITCS’13, Berkeley, CA, USA, January 9–12, 2013. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1859-4). 67-86 (2013). MSC: 68P15 68P30 91A80 PDF BibTeX XML Cite \textit{D. Xiao}, in: Proceedings of the 4th conference on innovations in theoretical computer science, ITCS'13, Berkeley, CA, USA, January 9--12, 2013. New York, NY: Association for Computing Machinery (ACM). 67--86 (2013; Zbl 1361.68076) Full Text: DOI
Ioannidis, Stratis; Loiseau, Patrick Linear regression as a non-cooperative game. (English) Zbl 1404.91014 Chen, Yiling (ed.) et al., Web and internet economics. 9th international conference, WINE 2013, Cambridge, MA, USA, December 11–14, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45045-7/pbk). Lecture Notes in Computer Science 8289, 277-290 (2013). MSC: 91A10 62J05 PDF BibTeX XML Cite \textit{S. Ioannidis} and \textit{P. Loiseau}, Lect. Notes Comput. Sci. 8289, 277--290 (2013; Zbl 1404.91014) Full Text: DOI arXiv
Manshaei, Mohammad Hossein; Zhu, Quanyan; Alpcan, Tansu; Bacşar, Tamer; Hubaux, Jean-Pierre Game theory meets network security and privacy. (English) Zbl 1293.91042 ACM Comput. Surv. 45, No. 3, Paper No. 1, 39 p. (2013). MSC: 91A80 68M10 68-02 94A60 PDF BibTeX XML Cite \textit{M. H. Manshaei} et al., ACM Comput. Surv. 45, No. 3, Paper No. 1, 39 p. (2013; Zbl 1293.91042) Full Text: DOI
Hsu, Justin; Roth, Aaron; Ullman, Jonathan Differential privacy for the analyst via private equilibrium computation. (English) Zbl 1293.68099 Proceedings of the 45th annual ACM symposium on theory of computing, STOC ’13. Palo Alto, CA, USA, June 1–4, 2013. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2029-0). 341-350 (2013). MSC: 68P15 91A05 91A80 94A62 PDF BibTeX XML Cite \textit{J. Hsu} et al., in: Proceedings of the 45th annual ACM symposium on theory of computing, STOC '13. Palo Alto, CA, USA, June 1--4, 2013. New York, NY: Association for Computing Machinery (ACM). 341--350 (2013; Zbl 1293.68099) Full Text: DOI
Miner More, Sara; Naumov, Pavel Calculus of cooperation and game-based reasoning about protocol privacy. (English) Zbl 1351.68168 ACM Trans. Comput. Log. 13, No. 3, Article No. 22, 21 p. (2012). MSC: 68Q60 03B70 68M12 91A12 91A80 PDF BibTeX XML Cite \textit{S. Miner More} and \textit{P. Naumov}, ACM Trans. Comput. Log. 13, No. 3, Article No. 22, 21 p. (2012; Zbl 1351.68168) Full Text: DOI
Izmalkov, Sergei; Lepinski, Matt; Micali, Silvio Perfect implementation. (English) Zbl 1205.91038 Games Econ. Behav. 71, No. 1, 121-140 (2011). MSC: 91A40 91A28 PDF BibTeX XML Cite \textit{S. Izmalkov} et al., Games Econ. Behav. 71, No. 1, 121--140 (2011; Zbl 1205.91038) Full Text: DOI
Kantarcioglu, Murat; Bensoussan, Alain; Hoe, SingRu (Celine) When do firms invest in privacy-preserving technologies? (English) Zbl 1298.91064 Alpcan, Tansu (ed.) et al., Decision and game theory for security. First international conference, GameSec 2010, Berlin, Germany, November 22–23, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17196-3/pbk). Lecture Notes in Computer Science 6442, 72-86 (2010). MSC: 91A80 68P25 91A65 PDF BibTeX XML Cite \textit{M. Kantarcioglu} et al., Lect. Notes Comput. Sci. 6442, 72--86 (2010; Zbl 1298.91064) Full Text: DOI
Humbert, Mathias; Manshaei, Mohammad Hossein; Freudiger, Julien; Hubaux, Jean-Pierre Tracking games in mobile networks. (English) Zbl 1298.91062 Alpcan, Tansu (ed.) et al., Decision and game theory for security. First international conference, GameSec 2010, Berlin, Germany, November 22–23, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17196-3/pbk). Lecture Notes in Computer Science 6442, 38-57 (2010). MSC: 91A80 68M10 68P25 PDF BibTeX XML Cite \textit{M. Humbert} et al., Lect. Notes Comput. Sci. 6442, 38--57 (2010; Zbl 1298.91062) Full Text: DOI
Sun, Yu-An; Vora, Poorvi Auctions and differential pricing: Optimal seller and bidder strategies in second-chance offers. (English) Zbl 1195.91063 Comput. Econ. 34, No. 3, 243-271 (2009). MSC: 91B26 90C59 91A20 68T05 91A26 PDF BibTeX XML Cite \textit{Y.-A. Sun} and \textit{P. Vora}, Comput. Econ. 34, No. 3, 243--271 (2009; Zbl 1195.91063) Full Text: DOI