Countering Hidden-Action Attacks on Networked Systems
暂无分享,去创建一个
[1] Terence H. Qualter,et al. Democracy and the Market , 1991 .
[2] Stuart E. Schechter. Toward econometric models of the security risk from remote attacks , 2005, IEEE Security & Privacy.
[3] Dan S. Wallach,et al. Enforcing Fair Sharing of Peer-to-Peer Resources , 2003, IPTPS.
[4] Muhammad Yunus,et al. Group-based savings and credit for the rural poor , 1986 .
[5] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[6] Ion Stoica,et al. Robust incentive techniques for peer-to-peer networks , 2004, EC '04.
[7] P. Dasgupta. Trust as a commodity , 1988 .
[8] Noam Nisan,et al. Algorithms for selfish agents mechanism design for distributed computation , 1999 .
[9] R. Anderson. The Eternity Service , 1996 .
[10] David C. Parkes,et al. Rationality and Self-Interest in Peer to Peer Networks , 2003, IPTPS.
[11] Christos H. Papadimitriou,et al. Free-riding and whitewashing in peer-to-peer systems , 2004, IEEE Journal on Selected Areas in Communications.
[12] P. Dasgupta. Social Capital and Economic Performance: Analytics* , 2002 .
[13] L. Camp. Economics of Information Security , 2006 .
[14] J.-P. Hubaux,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).
[15] Joan Feigenbaum,et al. A BGP-based mechanism for lowest-cost routing , 2002, PODC '02.
[16] George Danezis,et al. The Economics of Censorship Resistance , 2004 .
[17] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[18] Scott Shenker,et al. Hidden-action in multi-hop routing , 2005, EC '05.
[19] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[20] Elinor Ostrom,et al. Foundations of Social Capital , 2003 .
[21] Ross J. Anderson. Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.
[22] Levente Buttyán,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.
[23] Hal R. Varian,et al. Economic Mechanism Design for Computerized Agents , 1995, USENIX Workshop on Electronic Commerce.
[24] Ross J. Anderson,et al. On dealing with adversaries fairly , 2004 .
[25] Eytan Adar,et al. Free Riding on Gnutella , 2000, First Monday.
[26] P. Dasgupta,et al. Social capital : a multifaceted perspective , 1999 .
[27] Joan Feigenbaum,et al. A BGP-based mechanism for lowest-cost routing , 2002, PODC '02.