Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Auctions with Rational Adversary., and . ICISS, volume 8303 of Lecture Notes in Computer Science, page 91-105. Springer, (2013)Learning with an Embedded Reject Option: A Statistical Learning Theory Perspective., and . ICAISC, volume 3070 of Lecture Notes in Computer Science, page 664-669. Springer, (2004)On the Mean Weight Balance Factor of Binary Trees., and . FSTTCS, volume 181 of Lecture Notes in Computer Science, page 419-434. Springer, (1984)Achieving Energy Efficiency and Security in Mobile Cloud Computing., , and . CLOSER, page 469-474. SciTePress, (2013)Rejection schemes for graded multiclass problems., and . Artificial Intelligence and Applications, page 434-439. IASTED/ACTA Press, (2007)A Proposal for Quantum Rational Secret Sharing., , , and . CoRR, (2015)Achieving Correctness in Fair Rational Secret Sharing., and . CANS, volume 8257 of Lecture Notes in Computer Science, page 139-161. Springer, (2013)On the Asymptotic Performance of IDA*., , , , and . Ann. Math. Artif. Intell., 20 (1-4): 161-193 (1997)Collaborative Information Service - Privacy Algebra for User Defined Security., , and . ICISSP, page 473-481. SciTePress, (2016)Fairness in Secure Two-Party Computation with Rational Players., , and . IACR Cryptology ePrint Archive, (2015)