Guy Zyskind's research while affiliated with Massachusetts Institute of Technology and other places

Publications (5)

Chapter
Optimizing the use of available resources is one of the key challenges in activities that consist of interactionswith a large number of "target individuals", with the ultimate goal of affecting as many ofthem as possible, such as in marketing, service provision and political campaigns. Typically, the costof interactions is monotonically increasing...
Article
A peer-to-peer network, enabling different parties to jointly store and run computations on data while keeping the data completely private. Enigma's computational model is based on a highly optimized version of secure multi-party computation, guaranteed by a verifiable secret-sharing scheme. For storage, we use a modified distributed hashtable for...
Chapter
Optimizing the use of available resources is one of the key challenges in activities that consist of interactions with a large number of "target individuals", with the ultimate goal of affecting as many of them as possible, such as in marketing, service provision and political campaigns. Typically, the cost of interactions is monotonically increasi...
Article
Full-text available
Optimizing the use of available resources is one of the key challenges in activities that consist of interactions with a large number of “target individuals,” with the ultimate goal of “winning” as many of them as possible, such as in marketing, service provision, political campaigns, or homeland security. Typically, the cost of interactions is mon...

Citations

... It was also shown that this finding provides insight into the robustness of the network to particular patterns of link and node removal, as well as into the spreading processes that take place in the network [73,74]. In addition, recent work had demonstrated the trade-off between the number of individuals (the width of the data) and the amount of information available from each one (the depth of the data), with respect to the ability to accurately model crowds behavior [75][76][77][78][79]. An analytical approach to this problem discussing the (surprisingly large) amount of personal information that can be deduced by an "attacker" who has access to one's personal interactions' meta-data can be found in [80][81][82]. ...
... These exchanges or transactions are called blocks and are encoded and linked with others (Böhme et al. 2015). Blockchain information is stored on participating devices and is open access (Zyskind et al. 2015), making the exchange process transparent and immune to modifications (unalterable) (Brandvold et al. 2015). Once the data are verified, they can no longer be edited without the community's consent. ...
... Blockchain-based solution techniques for facilitating trustworthy and authorized identity registration. (Friese et al., 2014) (Mahalle et al., 2010) (Otte et al., 2017) Management of access and control to data Immutable log of events and management of access control to data (Conoscenti et al., 2016) (Zyskind et al., 2015) Trading of IoT data Issues of trading of collected IoT-based information systems data (Zhang & Wen, 2015) (Worner & von Bomhard, 2014) IoT device identity management Technical issues of symmetric and asymmetric key management for IoT devices (Axon, 2015) (Formkecht et al., 2014 Industrial IoT application Cloud service and blockchain-based industrial IoT (IIoT) application. (Bahga & Madisetti, 2016) Smart contracts Industrial applications of blockchain smart contracts to IoT-based applications. ...
... Generally speaking, the sensing and communication capabilities of a single swarm member are considered significantly limited compared to the difficulty of the collective task, where macroscopic swarm-level efficiency is achieved through an explicit or implicit cooperation by the swarm members, and it emerges from the system's design. Such designs are often inspired by biology (see [71] for evolutionary algorithms, Ref. [72] or [73] for behavior-based control models, Ref. [74] for flocking and dispersing models, Ref. [75] for predator-prey approaches), by physics [76], probabilistic theory [77], sociology [78], network theory [79,80], or by economics applications [64,[81][82][83][84]. ...