Guy Zyskind's research while affiliated with Massachusetts Institute of Technology and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (5)
Optimizing the use of available resources is one of the key challenges in activities that consist of interactionswith a large number of "target individuals", with the ultimate goal of affecting as many ofthem as possible, such as in marketing, service provision and political campaigns. Typically, the costof interactions is monotonically increasing...
A peer-to-peer network, enabling different parties to jointly store and run
computations on data while keeping the data completely private. Enigma's
computational model is based on a highly optimized version of secure
multi-party computation, guaranteed by a verifiable secret-sharing scheme. For
storage, we use a modified distributed hashtable for...
Optimizing the use of available resources is one of the key challenges in activities that consist of interactions with a large number of "target individuals", with the ultimate goal of affecting as many of them as possible, such as in marketing, service provision and political campaigns. Typically, the cost of interactions is monotonically increasi...
Optimizing the use of available resources is one of the key challenges in activities that consist of interactions with a large number of “target individuals,” with the ultimate goal of “winning” as many of them as possible, such as in marketing, service provision, political campaigns, or homeland security. Typically, the cost of interactions is mon...
Citations
... It was also shown that this finding provides insight into the robustness of the network to particular patterns of link and node removal, as well as into the spreading processes that take place in the network [73,74]. In addition, recent work had demonstrated the trade-off between the number of individuals (the width of the data) and the amount of information available from each one (the depth of the data), with respect to the ability to accurately model crowds behavior [75][76][77][78][79]. An analytical approach to this problem discussing the (surprisingly large) amount of personal information that can be deduced by an "attacker" who has access to one's personal interactions' meta-data can be found in [80][81][82]. ...
Reference: Ride Sharing and Dynamic Networks Analysis
... These exchanges or transactions are called blocks and are encoded and linked with others (Böhme et al. 2015). Blockchain information is stored on participating devices and is open access (Zyskind et al. 2015), making the exchange process transparent and immune to modifications (unalterable) (Brandvold et al. 2015). Once the data are verified, they can no longer be edited without the community's consent. ...
... Blockchain-based solution techniques for facilitating trustworthy and authorized identity registration. (Friese et al., 2014) (Mahalle et al., 2010) (Otte et al., 2017) Management of access and control to data Immutable log of events and management of access control to data (Conoscenti et al., 2016) (Zyskind et al., 2015) Trading of IoT data Issues of trading of collected IoT-based information systems data (Zhang & Wen, 2015) (Worner & von Bomhard, 2014) IoT device identity management Technical issues of symmetric and asymmetric key management for IoT devices (Axon, 2015) (Formkecht et al., 2014 Industrial IoT application Cloud service and blockchain-based industrial IoT (IIoT) application. (Bahga & Madisetti, 2016) Smart contracts Industrial applications of blockchain smart contracts to IoT-based applications. ...
... Generally speaking, the sensing and communication capabilities of a single swarm member are considered significantly limited compared to the difficulty of the collective task, where macroscopic swarm-level efficiency is achieved through an explicit or implicit cooperation by the swarm members, and it emerges from the system's design. Such designs are often inspired by biology (see [71] for evolutionary algorithms, Ref. [72] or [73] for behavior-based control models, Ref. [74] for flocking and dispersing models, Ref. [75] for predator-prey approaches), by physics [76], probabilistic theory [77], sociology [78], network theory [79,80], or by economics applications [64,[81][82][83][84]. ...