Sciweavers

INFOCOM
2012
IEEE
12 years 1 months ago
On detecting pollution attacks in inter-session network coding
Abstract—Dealing with pollution attacks in inter-session network coding is challenging due to the fact that sources, in addition to intermediate nodes, can be malicious. In this ...
Anh Le, Athina Markopoulou
TMM
2011
146views more  TMM 2011»
13 years 6 months ago
Game-Theoretic Strategies and Equilibriums in Multimedia Fingerprinting Social Networks
Abstract—Multimedia social network is a network infrastructure in which the social network users share multimedia contents with all different purposes. Analyzing user behavior in...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
WINE
2010
Springer
152views Economy» more  WINE 2010»
13 years 9 months ago
Collusion in VCG Path Procurement Auctions
We consider collusion in path procurement auctions, where payments are determined using the VCG mechanism. We show that collusion can increase the utility of the agents, and in som...
Yoram Bachrach, Peter Key, Morteza Zadimoghaddam
MOBIHOC
2010
ACM
13 years 9 months ago
Breaking bidder collusion in large-scale spectrum auctions
Dynamic spectrum auction is an effective solution to provide spectrum on-demand to many small wireless networks. As the number of participants grows, bidder collusion becomes a se...
Xia Zhou, Haitao Zheng
DATAMINE
2008
99views more  DATAMINE 2008»
13 years 11 months ago
Collusion set detection using graph clustering
Many mal-practices in stock market trading
Girish Keshav Palshikar, Manoj M. Apte
ATAL
2010
Springer
14 years 16 days ago
Honor among thieves: collusion in multi-unit auctions
We consider collusion in multi-unit auctions where the allocation and payments are determined using the VCG mechanism. We show how collusion can increase the utility of the collud...
Yoram Bachrach
AAAI
2010
14 years 27 days ago
Collusion Detection in Online Bridge
Collusion is a major unsolved security problem in online bridge: by illicitly exchanging card information over the telephone, instant messenger or the like, cheaters can gain huge...
Jeff Yan
EUROCRYPT
2005
Springer
14 years 5 months ago
Public Traceability in Traitor Tracing Schemes
Traitor tracing schemes are of major importance for secure distribution of digital content. They indeed aim at protecting content providers from colluding users to build pirate dec...
Hervé Chabanne, Duong Hieu Phan, David Poin...
IPCCC
2005
IEEE
14 years 5 months ago
Key management in wireless ad hoc networks: collusion analysis and prevention
Due to the dynamic nature of WAHN communications and the multi-node involvement in most WAHN applications, group key management has been proposed for efficient support of secure c...
Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Elto...
ICDCS
2007
IEEE
14 years 5 months ago
An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System
Peer-to-peer networks often use incentive policies to encourage cooperation between nodes. Such systems are generally susceptible to collusion by groups of users in order to gain ...
Qiao Lian, Zheng Zhang, Mao Yang, Ben Y. Zhao, Yaf...