Sciweavers

1191 search results - page 84 / 239
» Online Games and Security
Sort
View
ATAL
2011
Springer
12 years 8 months ago
Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up
The fastest known algorithm for solving General Bayesian Stackelberg games with a finite set of follower (adversary) types have seen direct practical use at the LAX airport for o...
Manish Jain, Christopher Kiekintveld, Milind Tambe
WISTP
2010
Springer
14 years 3 months ago
Security Analysis of Mobile Phones Used as OTP Generators
Abstract. The Norwegian company Encap has developed protocols enabling individuals to use their mobile phones as one-time password (OTP) generators. An initial analysis of the prot...
Håvard Raddum, Lars Hopland Nestås, Kj...
ICDCS
2008
IEEE
14 years 2 months ago
WebIBC: Identity Based Cryptography for Client Side Security in Web Applications
The growing popularity of web applications in the last few years has led users to give the management of their data to online application providers, which will endanger the securi...
Zhi Guan, Zhen Cao, Xuan Zhao, Ruichuan Chen, Zhon...
CCS
2004
ACM
13 years 12 months ago
A PIN-entry method resilient against shoulder surfing
Magnetic stripe cards are in common use for electronic payments and cash withdrawal. Reported incidents document that criminals easily pickpocket cards or skim them by swiping the...
Volker Roth, Kai Richter, Rene Freidinger
CN
2010
146views more  CN 2010»
13 years 8 months ago
Badumna: A decentralised network engine for virtual environments
Many of today's virtual environment applications, such as massively multi-player online games, involve a large and rapidly changing set of users. The server-based architectur...
Santosh Kulkarni, Scott Douglas, David Churchill