The Community for Technology Leaders
Green Image
We address issues related to sharing information in a distributed system consisting of autonomous entities, each of which holds a private database. We consider threats from malicious adversaries that can deviate from the designated protocol and change their input databases. We classify malicious adversaries into two widely existing subclasses, namely weakly and strongly malicious adversaries, and propose protocols that can effectively and efficiently protect privacy against malicious adversaries.
Information sharing, privacy

N. Zhang and W. Zhao, "Privacy Protection Against Malicious Adversaries in Distributed Information Sharing Systems," in IEEE Transactions on Knowledge & Data Engineering, vol. 20, no. , pp. 1028-1033, 2007.
88 ms
(Ver 3.3 (11022016))