4P_VES: A Collusion-Resistant Accountable Virtual Economy System

نویسندگان

  • Hong Zhang
  • Xiaolei Dong
  • Zhenfu Cao
  • Jiachen Shen
چکیده

‧Protecting elliptic curve cryptography against memory disclosure attacks ‧A guess-then-algebraic attack on LFSR-based stream ciphers with nonlinear filter ‧ How to compare selections of points of interest for side-channel distinguishers in practice

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Collusion-Resistant Audio Fingerprinting System in the Modulated Complex Lapped Transform Domain

Collusion-resistant fingerprinting paradigm seems to be a practical solution to the piracy problem as it allows media owners to detect any unauthorized copy and trace it back to the dishonest users. Despite the billionaire losses in the music industry, most of the collusion-resistant fingerprinting systems are devoted to digital images and very few to audio signals. In this paper, state-of-the-...

متن کامل

Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data

Recently, Yuan et al. (IEEE Infocom ’13, pp.2652–2660) proposed an efficient secure nearest neighbor (SNN) search scheme on encrypted cloud database. Their scheme is claimed to be secure against the collusion attack of query clients and cloud server, because the colluding attackers cannot infer the encryption/decryption key. In this letter, we observe that the encrypted dataset in Yuan’s scheme...

متن کامل

Collusion-Resistant Reputation Mechanism for Multi-Agents Systems

We address the collusion problem in a reputation multi-agent system where agents represent service providers, consumers, and a controller. A game structure is proposed where players are supposed rational and seek for maximum payoffs. The main issue addressed in this paper is how to maintain a collusion-resistant reputation mechanism. We analyze the behavior of different players with respect to ...

متن کامل

A Collusion-resistant Acknowledgement-based Secure Intrusion Detection System for MANETs

MANETs are based on wireless multi-hop communication. To ensure correct operation, nodes need to cooperate and forward messages from other nodes. However there can be misbehaving nodes that can silently drop packets. Such misbehaviors can be either an individual node misbehavior or misbehavior of nodes in collusion. In this paper, a new approach is proposed to identify and mitigate the packet d...

متن کامل

X Design and Secure Evaluation of Side-Choosing Games

We present an important, general class of new games, called side-choosing games (SCGs), for “gamifying” problem solving in formal sciences. Applications of SCGs include (1) peer-grading in teaching to (2) studying the evolution of knowledge in formal sciences to (3) organizing algorithm competitions. We view SCGs as a new programming language for human computation for formal problem solving and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014