Hardening Distributed Volunteer Computations. Distributed Volunteer Computing. A. C. Welcome to the Internet, my friend. How can I help you?. CAGGATCTCAAGC. 2351. 2351. 1624. 1624. CAGCATATCACGT. 2323. 2323. 1352. 1352. Participants (Bob). “Alice”. “Bob 1”. “Bob 2”.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Distributed Volunteer Computing
Welcome to the
Internet, my friend.
How can I help you?
Application and Platform Taxonomy
AI Methods for Detecting Malicious Activity
Enhanced Privacy via obscured data values
Application and Platform Specific Security Taxonomy
Improved Collusion Resistance, Fewer Tasks:
Genetic Sequence Privacy Example:
Participants compare ``offsets’’
NSF Award IIS-0524239:
Ensuring Computation Integrity in Distributed Volunteer Computing Platforms