A Game-Theoretic Approach to Anonymous Networking
暂无分享,去创建一个
[1] R. McEliece,et al. Some Information Theoretic Saddlepoints , 1985 .
[2] Eitan Altman,et al. Information Concealing Games , 2008, IEEE Transactions on Information Theory.
[3] Riccardo Bettati,et al. On Flow Correlation Attacks and Countermeasures in Mix Networks , 2004, Privacy Enhancing Technologies.
[4] R. Srikant,et al. Correlated jamming on MIMO Gaussian fading channels , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[5] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[6] J. Nash. Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.
[7] Lang Tong,et al. Detecting Information Flows: Improving Chaff Tolerance by Joint Detection , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[8] J. Goodman. Note on Existence and Uniqueness of Equilibrium Points for Concave N-Person Games , 1965 .
[9] Dawn Xiaodong Song,et al. Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds , 2004, RAID.
[10] Nick Mathewson,et al. Practical Traffic Analysis: Extending and Resisting Statistical Disclosure , 2004, Privacy Enhancing Technologies.
[11] Lang Tong,et al. Anonymous Networking Amidst Eavesdroppers , 2008, IEEE Transactions on Information Theory.
[12] F. Topsøe. Entropy and equilibrium via games of complexity , 2004 .
[13] T. Basar,et al. A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[14] Sennur Ulukus,et al. Mutual Information Games in Multi-user Channels with Correlated Jamming , 2006, ArXiv.
[15] Lang Tong,et al. Throughput Anonymity Trade-off in Wireless Networks under Latency Constraints , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[16] Jeannette M. Wing,et al. Game strategies in network security , 2005, International Journal of Information Security.
[17] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[18] Bruce Hajek,et al. Hiding traffic flow in communication networks , 1992, MILCOM 92 Conference Record.
[19] I. S. Moskowitz,et al. Metrics for Traffic Analysis Prevention , 2003 .
[20] Lang Tong,et al. Detection of Information Flows , 2008, IEEE Transactions on Information Theory.
[21] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[22] Tamer Basar,et al. With the Capacity 0.461(bits) and the Optimal Opd Being 'q = , 1998 .
[23] Yu Liu,et al. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection , 2006, Int. J. Secur. Networks.
[24] H. Kuhn. Classics in Game Theory , 1997 .