Sciweavers

39 search results - page 3 / 8
» Security Games for Controlling Contagion
Sort
View
139
Voted
DRM
2006
Springer
15 years 7 months ago
Consumers, fans, and control: what the games industry can teach Hollywood about DRM
Through legislation and technology the film industry has been seeking to fully control usage of the bits it creates; their model is "restrictive" digital-rights manageme...
Susan Landau, Renée Stratulate, Doug Twille...
125
Voted
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
15 years 4 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
113
Voted
OTM
2007
Springer
15 years 9 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
145
Voted
JSAC
2007
189views more  JSAC 2007»
15 years 3 months ago
Non-Cooperative Power Control for Wireless Ad Hoc Networks with Repeated Games
— One of the distinctive features in a wireless ad hoc network is lack of any central controller or single point of authority, in which each node/link then makes its own decision...
Chengnian Long, Qian Zhang, Bo Li, Huilong Yang, X...
114
Voted
CCS
2004
ACM
15 years 7 months ago
A PIN-entry method resilient against shoulder surfing
Magnetic stripe cards are in common use for electronic payments and cash withdrawal. Reported incidents document that criminals easily pickpocket cards or skim them by swiping the...
Volker Roth, Kai Richter, Rene Freidinger