Sciweavers

222 search results - page 6 / 45
» Equilibria for Networks with Malicious Users
Sort
View
MOBIHOC
2004
ACM
14 years 24 days ago
Market sharing games applied to content distribution in ad-hoc networks
In third generation (3G) wireless data networks, repeated requests for popular data items can exacerbate the already scarce wireless spectrum. In this paper we propose an architec...
Michel X. Goemans, Erran L. Li, Vahab S. Mirrokni,...
ACSAC
2009
IEEE
14 years 2 months ago
Analyzing and Detecting Malicious Flash Advertisements
—The amount of dynamic content on the web has been steadily increasing. Scripting languages such as JavaScript and browser extensions such as Adobe’s Flash have been instrument...
Sean Ford, Marco Cova, Christopher Kruegel, Giovan...
ESORICS
2010
Springer
13 years 8 months ago
Providing Mobile Users' Anonymity in Hybrid Networks
We present a novel hybrid communication protocol that guarantees mobile users' k-anonymity against a wide-range of adversaries by exploiting the capability of handheld devices...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
INFOCOM
2003
IEEE
14 years 19 days ago
Oblivious AQM and Nash Equilibria
—An oblivious Active Queue Management scheme is one which does not differentiate between packets belonging to different flows. In this paper, we study the existence and the qual...
Debojyoti Dutta, Ashish Goel, John S. Heidemann
P2P
2005
IEEE
14 years 29 days ago
ARA: A Robust Audit to Prevent Free-Riding in P2P Networks
A number of solutions have been proposed to address the free-riding problem in peer-to-peer file sharing systems. The solutions are either imperfect–they allow some users to ch...
MyungJoo Ham, Gul Agha