SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments
暂无分享,去创建一个
[1] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[2] Chris Joslin,et al. Trends in networked collaborative virtual environments , 2003, Comput. Commun..
[3] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[4] Jeff Yan,et al. Security design in online games , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[5] Muthucumaru Maheswaran,et al. A cheat controlled protocol for centralized online multiplayer games , 2004, NetGames '04.
[6] Chris Joslin,et al. Collaborative virtual environments: from birth to standardization , 2004, IEEE Communications Magazine.
[7] Brian Neil Levine,et al. Cheat-proof playout for centralized and peer-to-peer gaming , 2007, IEEE/ACM Trans. Netw..
[8] Brian Neil Levine,et al. Cheat-proof playout for centralized and distributed online games , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[9] Yasuo Hatano,et al. Efficient signature schemes supporting redaction, pseudonymization, and data deidentification , 2008, ASIACCS '08.
[10] Wenliang Du,et al. Uncheatable grid computing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[11] Siani Pearson,et al. Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy , 2005, iTrust.
[12] Honghui Lu,et al. Peer-to-peer support for massively multiplayer games , 2004, IEEE INFOCOM 2004.
[13] Muthucumaru Maheswaran,et al. A fair synchronization protocol with cheat proofing for decentralized online multiplayer games , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..
[14] Stefan Katzenbeisser,et al. Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[15] Mark Lentczner,et al. Second Life , 2007, USENIX Annual Technical Conference.
[16] Xiaoyun Wang,et al. Efficient Collision Search Attacks on SHA-0 , 2005, CRYPTO.
[17] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.