Sciweavers

167 search results - page 8 / 34
» A Game-Theoretic Approach to Anonymous Networking
Sort
View
HICSS
2010
IEEE
487views Biometrics» more  HICSS 2010»
14 years 2 months ago
A Survey of Game Theory as Applied to Network Security
Network security is a complex and challenging problem. The area of network defense mechanism design is receiving immense attention from the research community for more than two de...
Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipank...
NORDSEC
2009
Springer
14 years 2 months ago
A Parallelism-Based Approach to Network Anonymization
Considering topologies of anonymous networks we used to organizing anonymous communications into hard to trace paths, composed of several middleman nodes, towards hiding communicat...
Igor Margasinski
ICNP
2005
IEEE
14 years 1 months ago
Incentives to Promote Availability in Peer-to-Peer Anonymity Systems
Peer-to-peer (P2P) anonymous communication systems are vulnerable to free-riders, peers that use the system while providing little or no service to others and whose presence limit...
Daniel R. Figueiredo, Jonathan K. Shapiro, Donald ...
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 7 months ago
Stochastic Games for Security in Networks with Interdependent Nodes
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
WELCOM
2001
Springer
132views ECommerce» more  WELCOM 2001»
13 years 12 months ago
Incentives for Sharing in Peer-to-Peer Networks
The recent and unprecedented surge of public interest in peer-to-peer file sharing has led to a variety of interesting research questions. In this paper, we will address the ince...
Philippe Golle, Kevin Leyton-Brown, Ilya Mironov, ...