The Community for Technology Leaders
Green Image
We address issues related to sharing information in a distributed system consisting of autonomous entities, each of which holds a private database. We consider threats from malicious adversaries that can deviate from the designated protocol and change their input databases. We classify malicious adversaries into two widely existing subclasses, namely weakly and strongly malicious adversaries, and propose protocols that can effectively and efficiently protect privacy against malicious adversaries.
Information sharing, privacy
Nan Zhang, Wei Zhao, "Privacy Protection Against Malicious Adversaries in Distributed Information Sharing Systems", IEEE Transactions on Knowledge & Data Engineering, vol. 20, no. , pp. 1028-1033, August 2008, doi:10.1109/TKDE.2007.1069
92 ms
(Ver 3.1 (10032016))