Designing programs that check their work
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
Self-testing/correcting with applications to numerical problems
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
Randomized algorithms
Impossibility of distributed consensus with one faulty process
Journal of the ACM (JACM)
Chernoff-Hoeffding Bounds for Applications with Limited Independence
SIAM Journal on Discrete Mathematics
Distributed Algorithms
Uncheatable Distributed Computations
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Telling humans and computers apart automatically
Communications of the ACM - Information cities
Labeling images with a computer game
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Approximate object location and spam filtering on peer-to-peer systems
Proceedings of the ACM/IFIP/USENIX 2003 International Conference on Middleware
A secure and optimally efficient multi-authority election scheme
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
CAPTCHA: using hard AI problems for security
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
On countering online dictionary attacks with login histories and humans-in-the-loop
ACM Transactions on Information and System Security (TISSEC)
Internet-scale collection of human-reviewed data
Proceedings of the 16th international conference on World Wide Web
A comprehensive human computation framework: with application to image labeling
MM '08 Proceedings of the 16th ACM international conference on Multimedia
Conditional Payments for Computing Markets
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
VideoTicket: detecting identity fraud attempts via audiovisual certificates and signatures
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Fraud Detection by Human Agents: A Pilot Study
EC-Web 2009 Proceedings of the 10th International Conference on E-Commerce and Web Technologies
Human computation: a survey and taxonomy of a growing field
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A human-centric runtime framework for mixed service-oriented systems
Distributed and Parallel Databases
Secure distributed human computation
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Enforcing email addresses privacy using tokens
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
An analytical model for generalized ESP games
Knowledge-Based Systems
Formation and interaction patterns in social crowdsourcing environments
International Journal of Communication Networks and Distributed Systems
Crowdsourcing tasks to social networks in BPEL4People
World Wide Web
Hi-index | 0.00 |
This paper is a preliminary exploration of secure distributed human computation. We consider the general paradigm of using large-scale distributed computation to solve difficult problems, but where humans can act as agents and provide candidate solutions. We are especially motivated by problem classes that appear to be difficult for computers to solve effectively, but are easier for humans; e.g., image analysis, speech recognition, and natural language processing. This paradigm already seems to be employed in several real-world scenarios, but we are unaware of any formal and unified attempt to study it. Nonetheless, this concept spawns interesting research questions in algorithm design, human computer interfaces, and programming language / API design, distributed systems, and cryptography, among other fields. There are also interesting implications for Internet commerce and the B24b model. We describe this research area and suggest a basic framework for the design of such systems. We analyze security and reliability against malicious parties using standard probability theory tools. We then derive design principles using standard decision-theory concepts. Finally, we list extensions and open problems.