Sciweavers

594 search results - page 109 / 119
» Games with Secure Equilibria
Sort
View
COLCOM
2008
IEEE
14 years 2 months ago
Incentive and Trust Issues in Assured Information Sharing
Assured information sharing among different organizations in a coalitional environment is an important first step in accomplishing many critical tasks. For example, different secur...
Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thur...
VTC
2007
IEEE
138views Communications» more  VTC 2007»
14 years 1 months ago
Performance Evaluation of IEEE 802.11-based WLANs in Vehicular Scenarios
—Communication between cars can be exploited for various applications. Security enhancements as well as interactive games played by occupants of different cars are only two examp...
Matthias Wellens, Burkhard Westphal, Petri Mä...
FC
2007
Springer
128views Cryptology» more  FC 2007»
14 years 1 months ago
Informant: Detecting Sybils Using Incentives
We propose an economic approach to Sybil attack detection. In our Informant protocol, a detective offers a reward for Sybils to reveal themselves. The detective accepts from one i...
N. Boris Margolin, Brian Neil Levine
ATVA
2006
Springer
106views Hardware» more  ATVA 2006»
13 years 11 months ago
Efficient Algorithms for Alternating Pushdown Systems with an Application to the Computation of Certificate Chains
Motivated by recent applications of pushdown systems to computer security problems, we present an efficient algorithm for the reachability problem of alternating pushdown systems. ...
Dejvuth Suwimonteerabuth, Stefan Schwoon, Javier E...
CCGRID
2001
IEEE
13 years 11 months ago
While You're Away: A System for Load-Balancing and Resource Sharing Based on Mobile Agents
While You're Away (WYA) is a distributed system that aggregates the computational power of individual computer systems. WYA introduces the notion of Roaming Computations - Ja...
Niranjan Suri, Paul T. Groth, Jeffrey M. Bradshaw