Sciweavers

120 search results - page 3 / 24
» Security Games with Protection Externalities
Sort
View
ICDCS
2003
IEEE
13 years 11 months ago
Monotonicity and Partial Results Protection for Mobile Agents
Remotely executing mobile code introduces a plethora of security problems. This paper examines the “external agent replay” attack, identifies the notion of one-way program st...
Bennet S. Yee
TELSYS
2010
154views more  TELSYS 2010»
13 years 16 days ago
Blocking attacks on SIP VoIP proxies caused by external processing
As Voice over IP (VoIP) applications become increasingly popular, they are more and more facing security challenges that have not been present in the traditional Public Switched Te...
Ge Zhang, Simone Fischer-Hübner, Sven Ehlert
WWW
2008
ACM
14 years 6 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
PST
2004
13 years 7 months ago
Online Gaming Crime and Security Issue - Cases and Countermeasures from Taiwan
Along with the growth of information technology, online gaming has become a very successful and outstanding industry, especially in Asia. However due to the lack of legal regulatio...
Ying-Chieh Chen, Patrick S. Chen, Ronggong Song, L...
MA
2001
Springer
98views Communications» more  MA 2001»
13 years 10 months ago
On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection
Mobile agent security is still a young discipline and most naturally, the focus up to the time of writing was on inventing new cryptographic protocols for securing various aspects ...
Volker Roth