Sciweavers

LPAR
2010
Springer
13 years 2 months ago
Coping with Selfish On-Going Behaviors
A rational and selfish environment may have an incentive to cheat the system it interacts with. Cheating the system amounts to reporting a stream of inputs that is different from ...
Orna Kupferman, Tami Tamir
FSTTCS
2010
Springer
13 years 2 months ago
Lower bounds for Quantum Oblivious Transfer
Oblivious transfer is a fundamental primitive in cryptography. While perfect information theoretic security is impossible, quantum oblivious transfer protocols can limit the disho...
André Chailloux, Iordanis Kerenidis, Jamie ...
TMC
2010
158views more  TMC 2010»
13 years 2 months ago
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
—Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an important problem in mobile wireless ad hoc and sensor networks. Despite significa...
Murtuza Jadliwala, Sheng Zhong, Shambhu J. Upadhya...
ACE
2003
110views Education» more  ACE 2003»
13 years 5 months ago
Determination of Factors which Impact on IT Students' Propensity to Cheat
There is a large body of research that indicates the practice of cheating amongst students in the tertiary sector is widespread. Various studies have also attempted to determine r...
Judy Sheard, Angela Carbone, Martin Dick
EUC
2006
Springer
13 years 8 months ago
Impact of Node Cheating on Gossip-Based Protocol
Gossip-based protocol has been widely adopted by many large-scale multicast applications. In this paper, we study the impact of node cheating on decentralized gossip-based protocol...
Nan Zhang, Yuanchun Shi, Bin Chang
ASIACRYPT
2006
Springer
13 years 8 months ago
Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution
We consider the problem of cheating in secret sharing schemes, cheating in which individuals submit forged shares in the secret reconstruction phase in an effort to make another pa...
Satoshi Obana, Toshinori Araki
DIMEA
2007
140views Multimedia» more  DIMEA 2007»
13 years 8 months ago
Cheating in networked computer games: a review
The increasing popularity of Massively Multiplayer Online Games (MMOG)
Steven Daniel Webb, Sieteng Soh
ICECCS
2007
IEEE
95views Hardware» more  ICECCS 2007»
13 years 10 months ago
A Novel Approach to the Detection of Cheating in Multiplayer Online Games
— Modern online multiplayer games are complex heterogeneous distributed systems comprised of servers and untrusted clients, which are often engineered under considerable commerci...
Peter Laurens, Richard F. Paige, Phillip J. Brooke...
ICC
2007
IEEE
105views Communications» more  ICC 2007»
13 years 10 months ago
An Experimental Study on Cheating and Anti-Cheating in Gossip-Based Protocol
Abstract—The Internet has witnessed a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node independen...
Yun Tang, Nan Zhang, Yuanchun Shi, Shiqiang Yang, ...
ATAL
2009
Springer
13 years 11 months ago
Smart cheaters do prosper: defeating trust and reputation systems
Traders in electronic marketplaces may behave dishonestly, cheating other agents. A multitude of trust and reputation systems have been proposed to try to cope with the problem of...
Reid Kerr, Robin Cohen