A game-theoretical and cryptographical approach to crypto-cloud computing and its economical and financial aspects
DOI10.1007/S10479-016-2139-YzbMATH Open1404.91065OpenAlexW2287717051MaRDI QIDQ1703553FDOQ1703553
Authors: Barış Bülent Kırlar, Serap Ergün, Gerhard-Wilhelm Weber, Sirma Zeynep Alparslan-Gok
Publication date: 2 March 2018
Published in: Annals of Operations Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10479-016-2139-y
Recommendations
- An application of crypto cloud computing in social networks by cooperative game theory
- Cryptography and game theory
- Bridging Game Theory and Cryptography: Recent Results and Future Directions
- scientific article; zbMATH DE number 5879525
- Game theory-based optimization of distributed idle computing resources in cloud environments
Cooperative games (91A12) Applications of game theory (91A80) Cryptography (94A60) Software, source code, etc. for problems pertaining to game theory, economics, and finance (91-04) Mathematical economics (91B99) Actuarial science and mathematical finance (91G99) Internet topics (68M11)
Cites Work
- On the shortest spanning subtree of a graph and the traveling salesman problem
- Probabilistic encryption
- Title not available (Why is that?)
- Public-key cryptosystems based on cubic finite field extensions
- On cost allocation for a spanning tree: A game theoretic approach
- Models in Cooperative Game Theory
- Title not available (Why is that?)
- Cost allocation for a spanning tree
- Operations research games: A survey. (With comments and rejoinder)
- Compromise values in cooperative game theory
- Computer science and decision theory
- The interval Shapley value: an axiomatization
- On the History of the Minimum Spanning Tree Problem
- Title not available (Why is that?)
- Connection situations under uncertainty and cost monotonic solutions
- Title not available (Why is that?)
- A vertex oriented approach to the equal remaining obligations rule for minimum cost spanning tree situations
- Message transmission for GH-public key cryptosystem
- An overview of trace based public key cryptography over finite fields
- Of threats and costs: a game-theoretic approach to security risk management
- New LFSR-Based Cryptosystems and the Trace Discrete Log Problem (Trace-DLP)
Cited In (5)
- Efficient message transmission via twisted Edwards curves
- An application of crypto cloud computing in social networks by cooperative game theory
- Product green degree, service free-riding, strategic price difference in a dual-channel supply chain based on dynamic game
- Extension of generalized solidarity values to interval-valued cooperative games
- Fuzzy perspective of online games by using cryptography and cooperative game theory
This page was built for publication: A game-theoretical and cryptographical approach to crypto-cloud computing and its economical and financial aspects
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1703553)