Sciweavers

3130 search results - page 1 / 626
» Collusion without communication
Sort
View
IEPOL
2006
75views more  IEPOL 2006»
13 years 5 months ago
Collusion without communication
Tacit cartels did not arise in experimental triopoly markets even with the help of detailed instructions to prospective cartel members on how to coordinate actions. In duopoly mar...
Astri Muren, Roger Pyddoke
MOBIHOC
2010
ACM
13 years 3 months ago
Breaking bidder collusion in large-scale spectrum auctions
Dynamic spectrum auction is an effective solution to provide spectrum on-demand to many small wireless networks. As the number of participants grows, bidder collusion becomes a se...
Xia Zhou, Haitao Zheng
INFOCOM
2010
IEEE
13 years 3 months ago
An Optimal Key Distribution Scheme for Secure Multicast Group Communication
Abstract— Many IP multicast-based applications, such as multimedia conferencing, multiplayer games, require controlling the group memberships of senders and receivers. One common...
Zhibin Zhou, Dijiang Huang
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
14 years 5 months ago
Efficient anonymity-preserving data collection
The output of a data mining algorithm is only as good as its inputs, and individuals are often unwilling to provide accurate data about sensitive topics such as medical history an...
Justin Brickell, Vitaly Shmatikov
ICNP
2003
IEEE
13 years 10 months ago
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
A prerequisite for secure communication between two nodes in an ad hoc network is that the nodes share a key to bootstrap their trust relationship. In this paper, we present a sca...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...