Anonymous networking with localized eavesdroppers: A game-theoretic approach
暂无分享,去创建一个
[1] T. Basar,et al. A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[2] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[3] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[4] J. Nash. Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.
[5] Riccardo Bettati,et al. On Flow Correlation Attacks and Countermeasures in Mix Networks , 2004, Privacy Enhancing Technologies.
[6] Yu Liu,et al. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection , 2006, Int. J. Secur. Networks.
[7] H. Kuhn. Classics in Game Theory , 1997 .
[8] Bruce Hajek,et al. Hiding traffic flow in communication networks , 1992, MILCOM 92 Conference Record.
[9] Jeannette M. Wing,et al. Game strategies in network security , 2005, International Journal of Information Security.
[10] Lang Tong,et al. Detecting Information Flows: Improving Chaff Tolerance by Joint Detection , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[11] Lang Tong,et al. Relay Secrecy in Wireless Networks with Eavesdroppers , 2006 .
[12] J. Goodman. Note on Existence and Uniqueness of Equilibrium Points for Concave N-Person Games , 1965 .
[13] Lang Tong,et al. Anonymous Networking Amidst Eavesdroppers , 2008, IEEE Transactions on Information Theory.