4P_VES: A Collusion-Resistant Accountable Virtual Economy System
نویسندگان
چکیده
‧Protecting elliptic curve cryptography against memory disclosure attacks ‧A guess-then-algebraic attack on LFSR-based stream ciphers with nonlinear filter ‧ How to compare selections of points of interest for side-channel distinguishers in practice
منابع مشابه
Collusion-Resistant Audio Fingerprinting System in the Modulated Complex Lapped Transform Domain
Collusion-resistant fingerprinting paradigm seems to be a practical solution to the piracy problem as it allows media owners to detect any unauthorized copy and trace it back to the dishonest users. Despite the billionaire losses in the music industry, most of the collusion-resistant fingerprinting systems are devoted to digital images and very few to audio signals. In this paper, state-of-the-...
متن کاملSecurity Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data
Recently, Yuan et al. (IEEE Infocom ’13, pp.2652–2660) proposed an efficient secure nearest neighbor (SNN) search scheme on encrypted cloud database. Their scheme is claimed to be secure against the collusion attack of query clients and cloud server, because the colluding attackers cannot infer the encryption/decryption key. In this letter, we observe that the encrypted dataset in Yuan’s scheme...
متن کاملCollusion-Resistant Reputation Mechanism for Multi-Agents Systems
We address the collusion problem in a reputation multi-agent system where agents represent service providers, consumers, and a controller. A game structure is proposed where players are supposed rational and seek for maximum payoffs. The main issue addressed in this paper is how to maintain a collusion-resistant reputation mechanism. We analyze the behavior of different players with respect to ...
متن کاملA Collusion-resistant Acknowledgement-based Secure Intrusion Detection System for MANETs
MANETs are based on wireless multi-hop communication. To ensure correct operation, nodes need to cooperate and forward messages from other nodes. However there can be misbehaving nodes that can silently drop packets. Such misbehaviors can be either an individual node misbehavior or misbehavior of nodes in collusion. In this paper, a new approach is proposed to identify and mitigate the packet d...
متن کاملX Design and Secure Evaluation of Side-Choosing Games
We present an important, general class of new games, called side-choosing games (SCGs), for “gamifying” problem solving in formal sciences. Applications of SCGs include (1) peer-grading in teaching to (2) studying the evolution of knowledge in formal sciences to (3) organizing algorithm competitions. We view SCGs as a new programming language for human computation for formal problem solving and...
متن کامل