Defending against Speculative Attacks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Defending Against Speculative Attacks: Reputation, Learning, and Coordination

How does the central bank’s incentive to build a reputation affect speculators’ ability to coordinate and the likelihood of the devaluation outcome during speculative currency crises? What role does market information play in speculators’ coordination and the central bank’s reputation building? I address these questions in a dynamic regime change game that highlights the interaction between the...

متن کامل

Defending against speculative attacks when market opinions diverge

In a stylized continuous-time model of a small open economy with perfect capital mobility and a pegged exchange rate, I analyze an experiment in which domestic residents expect a future devaluation. Taking the public’s expectations as exogenous and allowing them to be divergent, I analyze in a short time period before the expected devaluation takes place how transactions of short-term collatera...

متن کامل

Defending BitTorrent against Strategic Attacks

BitTorrent has shown to be efficient for bulk file transfer, however, it is susceptible to free riding by strategic clients like BitTyrant. Strategic peers configure the client software such that for very less or no contribution, they can obtain good download speeds. Such strategic nodes exploit the altruism in the swarm and consume resources at the expense of other honest nodes and create an u...

متن کامل

Defending RFID authentication protocols against DoS attacks

In this paper, we present a security weakness of a forward secure authentication protocol proposed by Tri Van Le et al. called O-FRAP which stands for Optimistic Forward secure RFID Authentication Protocol. In particular, we point out that in the O-FRAP protocol, the server can be subject to a denial-of-service attack due to a flaw in the database querying procedure. Our attack also applies to ...

متن کامل

Defending Against Distributed Denial of Service Attacks

The Denial of Service attack, especially the Distributed Denial of Service (DDoS) attack, has become one of the major threats to the Internet. Generally, attackers launch DDoS attacks by directing a massive number of attack sources to send useless traffic to the victim. The victim’s services are disrupted when its host or network resources are occupied by the attack traffic. The threat of DDoS ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SSRN Electronic Journal

سال: 2008

ISSN: 1556-5068

DOI: 10.2139/ssrn.1274115