|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 379 occurrences of 238 keywords
|
|
|
Results
Found 755 publication records. Showing 755 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Yoram Moses, Danny Dolev, Joseph Y. Halpern |
Cheating Husbands and other Stories: A Case Study of Knowledge, Action, and Communication. |
Distributed Comput. |
1986 |
DBLP DOI BibTeX RDF |
|
17 | Ian Bowler |
The Synthesis of Complex Audio Spectra by Cheating Quite a Lot. |
ICMC |
1985 |
DBLP BibTeX RDF |
|
17 | Yoram Moses, Danny Dolev, Joseph Y. Halpern |
Cheating Husbands and Other Stories: A Case Study of Knowledge, Action, and Communication (Preliminary Version). |
PODC |
1985 |
DBLP DOI BibTeX RDF |
|
17 | Mary Shaw, Anita Jones, Paul Knueven, John McDermott, Philip Miller 0001, David Notkin |
Cheating Policy in a Computer Science Department. |
ACM SIGCSE Bull. |
1980 |
DBLP DOI BibTeX RDF |
|
11 | Huawang Qin, Yuewei Dai, Zhiquan Wang |
A secret sharing scheme based on (t, n) threshold and adversary structure. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
Adversary structure, Cryptography, Information security, Secret sharing, Threshold |
11 | Lifeng Lai, Hesham El Gamal, H. Vincent Poor |
Authentication Over Noisy Channels. |
IEEE Trans. Inf. Theory |
2009 |
DBLP DOI BibTeX RDF |
|
11 | David Pinelle, Nelson Wong, Tadeusz Stach, Carl Gutwin |
Usability heuristics for networked multiplayer games. |
GROUP |
2009 |
DBLP DOI BibTeX RDF |
NGH, game usability, networked game heuristics, usability, heuristic evaluation, networked games, multiplayer games |
11 | Chien-Ju Ho, Tao-Hsuan Chang, Jong-Chuan Lee, Jane Yung-jen Hsu, Kuan-Ta Chen |
KissKissBan: a competitive human computation game for image annotation. |
KDD Workshop on Human Computation |
2009 |
DBLP DOI BibTeX RDF |
Amazon Mechanical Turk, ESP game, image annotation, human computation, games with a purpose |
11 | James B. Fenwick Jr., Cindy Norris, E. Frank Barry, Josh Rountree, Cole J. Spicer, Scott D. Cheek |
Another look at the behaviors of novice programmers. |
SIGCSE |
2009 |
DBLP DOI BibTeX RDF |
compilation, pattern, cs1, behavior |
11 | Benoît Libert, Damien Vergnaud |
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
efficiency, traceability, Identity-based encryption |
11 | Jing Li 0075, Dianfu Ma, Jun Han, Xiang Long |
Toward Trustworthy Semantic Web Service Discovery and Selection. |
ATC |
2009 |
DBLP DOI BibTeX RDF |
Services, Service Discovery, Semantic Web Service, Trustworthy |
11 | Martin Serrano, Sven van der Meer, John Strassner, Stefano De Paoli, Aphra Kerr, Cristiano Storni |
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications. |
ATC |
2009 |
DBLP DOI BibTeX RDF |
Pervasive Services, Social Networks, Pervasive Computing, Information Systems, Trust Management, Systems Management, Policy-Based Management, Autonomic Communications, Reputation Mechanisms |
11 | Svend Rothmann Bonde, Lise Vestergaard Jensen, Emil Sellström, Stephan Suesmann |
Draw poker. |
SIGGRAPH ASIA Animations |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Rahul Jain 0001 |
New Binding-Concealing Trade-Offs for Quantum String Commitment. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
String commitment, Quantum channels, Observational divergence, Substate theorem, Relative entropy |
11 | Han Yu 0001, Zhiqi Shen 0001, Chunyan Miao |
A goal-oriented development tool to automate the incorporation of intelligent agents into interactive digital media applications. |
Comput. Entertain. |
2008 |
DBLP DOI BibTeX RDF |
distributed system, multi-agent system, intelligent agent, design tool, goal-oriented |
11 | G. I. Ankoudinov, I. G. Ankoudinov, A. I. Strizhachenko |
Multi-Variant Assignment Generation and Assessment Techniques. |
Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Alison Gazzard |
Grand Theft algorithm: purposeful play, appropriated play and aberrant players. |
MindTrek |
2008 |
DBLP DOI BibTeX RDF |
aberrant players, appropriated play, purposeful play, flow, videogame |
11 | Xu An Wang 0001, Xinyi Huang 0001, Xiaoyuan Yang 0002 |
Further Observations on Certificateless Public Key Encryption. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Paolo Penna, Carmine Ventre |
Collusion-Resistant Mechanisms with Verification Yielding Optimal Solutions. |
ESA |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Sean Hallgren, Alexandra Kolla, Pranab Sen, Shengyu Zhang |
Making Classical Honest Verifier Zero Knowledge Protocols Secure against Quantum Attacks. |
ICALP (2) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu |
A game theoretic framework for incentive-based peer-to-peer live-streaming social networks. |
ICASSP |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Jing Xi, Pengpeng Nie, Jiande Lu |
A P2P Trust Model Based on Dynamic Fuzzy Theory -- BGTR. |
ISIP |
2008 |
DBLP DOI BibTeX RDF |
security, p2p, trust, fuzzy |
11 | Shaili Jain, David C. Parkes |
A Game-Theoretic Analysis of Games with a Purpose. |
WINE |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Hamed Janzadeh, Kaveh Fayazbakhsh, Bahador Bakhshi, Mehdi Dehghan 0001 |
A Novel Incentive-Based and Hardware-Independent Cooperation Mechanism for MANETs. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Georgios Smaragdakis, Vassilis Lekakis, Nikolaos Laoutaris, Azer Bestavros, John W. Byers, Mema Roussopoulos |
EGOIST: overlay routing using selfish neighbor selection. |
CoNEXT |
2008 |
DBLP DOI BibTeX RDF |
overlay network creation and maintenance, selfish neighbor selection, overlay routing |
11 | Éric Levieil, David Naccache |
Cryptographic Test Correction. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Lisha Chen-Wilson, Patrick Newcombe, Piers Royce, Samuel Ong, Timothy Wonnacott, Gary B. Wills, David Argles |
Secure Certification for ePortfolios. |
ICALT |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Elisardo González-Agulla, Luis E. Anido-Rifón, José Luis Alba-Castro, Carmen García-Mateo |
Is My Student at the Other Side? Applying Biometric Web Authentication to E-Learning Environments. |
ICALT |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Narayanan Kulathuramaiyer, Bilal Zaka, Denis Helic |
Integrated Copy-Paste Checking: Design and Services. |
ICALT |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Ivan Damgård, Jesper Buus Nielsen, Daniel Wichs |
Isolated Proofs of Knowledge and Isolated Zero Knowledge. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Yuko Sakurai, Yasumasa Saito, Atsushi Iwasaki, Makoto Yokoo |
Beyond Quasi-linear Utility: Strategy/False-Name-Proof Multi-unit Auction Protocols. |
IAT |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Zhengfeng Hou, Jianghong Han, Donghui Hu |
A New Authentication Scheme Based on Verifiable Secret Sharing. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Qiang Zhang, Ying Zhuo, Zhenghu Gong |
A Trust Inspection Model Based on Society Behavior Similarity Rule in Dynamic Networks. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Qi Chen, Song-Nian Yu, Sisi Cheng |
Link Variable TrustRank for Fighting Web Spam. |
CSSE (4) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Carlos Eduardo Benevides Bezerra, Fábio Reis Cecin, Cláudio F. R. Geyer |
A3: A Novel Interest Management Algorithm for Distributed Simulations of MMOGs. |
DS-RT |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Wiebren de Jonge, Bart Jacobs 0001 |
Privacy-Friendly Electronic Traffic Pricing via Commits. |
Formal Aspects in Security and Trust |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Christoph Neumann, Nicolas Prigent, Matteo Varvello, Kyoungwon Suh |
Challenges in peer-to-peer gaming. |
Comput. Commun. Rev. |
2007 |
DBLP DOI BibTeX RDF |
overlay online-gaming, security, peer-to-peer |
11 | Guang Tan, Stephen A. Jarvis |
Improving the Fault Resilience of Overlay Multicast for Media Streaming. |
IEEE Trans. Parallel Distributed Syst. |
2007 |
DBLP DOI BibTeX RDF |
Reliability, peer-to-peer, multicast, overlay, media streaming, fault resilience |
11 | Patric Kabus, Alejandro P. Buchmann |
Design of a cheat-resistant P2P online gaming system. |
DIMEA |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Melek Önen, Abdullatif Shikfa, Refik Molva |
Optimistic fair exchange for secure forwarding. |
MobiQuitous |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Yitao Duan, John F. Canny, Justin Z. Zhan |
Efficient Privacy-Preserving Association Rule Mining: P4P Style. |
CIDM |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Yonatan Aumann, Yehuda Lindell |
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Paul Rabinovich, Robert Simon |
Secure Aggregation in Sensor Networks Using Neighborhood Watch. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Gennaro Costagliola, Vittorio Fuccella, Massimiliano Giordano, Giuseppe Polese |
Logging and Visualization of Learner Behaviour in Web-Based E-Testing. |
ICWL |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Bogdan Carbunar, Brett Lindsley, Michael Pearce, Venu Vasudevan |
Verifiable Credit Based Transfers in Wireless Ad Hoc Networks. |
IPDPS |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Wun-She Yap, Swee-Huay Heng, Bok-Min Goi |
Cryptanalysis of Some Proxy Signature Schemes Without Certificates. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
attack, Proxy signature, identity-based, certificateless |
11 | Shane Balfe, Anish Mohammed |
Final Fantasy - Securing On-Line Gaming with Trusted Computing. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Kristal T. Pollack, Darrell D. E. Long, Richard A. Golding, Ralph A. Becker-Szendy, Benjamin C. Reed |
Quota enforcement for high-performance distributed storage systems. |
MSST |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Souvik Ray, Giora Slutzki, Zhao Zhang |
Incentive-Driven P2P Anonymity System: A Game-Theoretic Approach. |
ICPP |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Dong-Her Shih, Chih-Hung Cheng, Jui-Chi Shen |
A Secure Protocol of Reverse Discriminatory Auction with Bid Privacy. |
ICMB |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Li Zhang 0066, Ping-Ping Zhou, Gong-bin Qian, Zhen Ji |
A DWT Blind Image Watermarking Strategy with Secret Sharing. |
PCM |
2007 |
DBLP DOI BibTeX RDF |
blind image watermarking, secret sharing, closed loop, Stirmark |
11 | N. R. Sunitha, B. B. Amberker, Prashant Koulgi |
Controlled Delegation in e-cheques Using Proxy Signatures. |
EDOC |
2007 |
DBLP DOI BibTeX RDF |
Se- curity, Digital Signature, Proxy Signature, DSA |
11 | Akcell |
Motivate AI Class with Interactive Computer Game. |
DIGITEL |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Duen Horng Chau, Shashank Pandit, Christos Faloutsos |
Detecting Fraudulent Personalities in Networks of Online Auctioneers. |
PKDD |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich |
How to win the clonewars: efficient periodic n-times anonymous authentication. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
n-anonymous authentication, credentials, clone detection |
11 | Wei Zhou, Ke Xu, J. Liu, Chi-Hung Chi |
Truthful application-layer multicast in mesh-based selfish overlays. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Shunsaku Kato, Shuichi Miyazaki, Yusuke Nishimura, Yasuo Okabe |
Cheat-Proof Serverless Network Games. |
Computers and Games |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Tom R. Wielicki |
Integrity of Online Testing in E-Learning: Empirical Study. |
PerCom Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Qiming Li, Ee-Chien Chang |
Zero-knowledge watermark detection resistant to ambiguity attacks. |
MM&Sec |
2006 |
DBLP DOI BibTeX RDF |
ambiguity attack, zero-knowledge proof, watermark detection |
11 | Keiichi Endo, Minoru Kawahara, Yutaka Takahashi 0001 |
A proposal of encoded computations for distributed massively multiplayer online services. |
Advances in Computer Entertainment Technology |
2006 |
DBLP DOI BibTeX RDF |
distributed massively multiplayer online services, encoded computations, interactive real-time applications, peer-to-peer |
11 | Emmanuelle Anceaume, Aina Ravoaja |
Incentive-Based Robust Reputation Mechanism for P2P Services. |
OPODIS |
2006 |
DBLP DOI BibTeX RDF |
Reputation, peer-to-peer systems, credibility, free-riding, collusion |
11 | Omkant Pandey, Julien Cathalo, Jean-Jacques Quisquater |
Fair Identification. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Spyridon Antonakopoulos |
Fast leader-election protocols with bounded cheaters' edge. |
STOC |
2006 |
DBLP DOI BibTeX RDF |
distributed computing, leader election, coin-flipping |
11 | Mark Manulis, Ahmad-Reza Sadeghi |
Property-Based Taming of Lying Mobile Nodes. |
AINA (2) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Song Han 0004, Elizabeth Chang 0001, Tharam S. Dillon, Jie Wang 0038 |
Improvement of a Convertible Undeniable Partially Blind Signature Scheme. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
Partially blind signature, Convertible undeniable signature, Security protocol, Blind signature, Undeniable signature |
11 | Fábio Reis Cecin, Cláudio Fernando Resin Geyer, Solon Rabello, Jorge L. V. Barbosa |
A peer-to-peer simulation technique for instanced massively multiplayer games. |
DS-RT |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Samarth Shetty, Patricio Galdames, Wallapak Tavanapong, Ying Cai |
Detecting Malicious Peers in Overlay Multicast Streaming. |
LCN |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Radu Jurca, Boi Faltings |
Using CHI-scores to reward honest feedback from repeated interactions. |
AAMAS |
2006 |
DBLP DOI BibTeX RDF |
honest reporting, reputation mechanisms |
11 | Kenneth A. Ross |
Academic dishonesty and the Internet. |
Commun. ACM |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Philippe Golle, Nicolas Ducheneaut |
Preventing bots from playing online games. |
Comput. Entertain. |
2005 |
DBLP DOI BibTeX RDF |
reverse Turing test, agents, games, CAPTCHAs, bots |
11 | Chrisantha Fernando |
The Good Symbiont. |
ECAL |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Matthew Yurkewych, Brian Neil Levine, Arnold L. Rosenberg |
On the cost-ineffectiveness of redundancy in commercial P2P computing. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
game theory, redundancy, P2P computing, collusion |
11 | Li Tang, Jun Li 0003, Jin Zhou, Zhizhi Zhou, Hao Wang, Kai Li |
FreeRank: implementing independent ranking service for multiplayer online games. |
NETGAMES |
2005 |
DBLP DOI BibTeX RDF |
freerank, ranking service, multiplayer online games |
11 | Guilin Wang |
An abuse-free fair contract signing protocol based on the RSA signature. |
WWW |
2005 |
DBLP DOI BibTeX RDF |
security, e-commerce, digital signatures, RSA, cryptographic protocols, fair-exchange, contract signing |
11 | Matt Lepinski, Silvio Micali, Abhi Shelat |
Fair-Zero Knowledge. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Frank Stajano |
Repairing the Bluetooth Pairing Protocol. |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Markus Jakobsson, Liu Yang |
Quantifying Security in Hybrid Cellular Networks. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Le-Hung Vu, Manfred Hauswirth, Karl Aberer |
QoS-Based Service Selection and Ranking with Trust and Reputation Management. |
OTM Conferences (1) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Alexei Tretiakov, Kinshuk |
An Allocation Model for Automatic Assignment Generation and Marking. |
ICALT |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Wei Yu 0003, Yan Sun 0001, K. J. Ray Liu |
HADOF: defense against routing disruptions in mobile ad hoc networks. |
INFOCOM |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Sandra M. Richardson, Kelly McNamara Hilmer, James F. Courtney |
Compliance with Codes of Ethical Conduct: The Effects of Authority and Proximity on Ethical Reasoning. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Maosheng Li, Shoubao Yang, Qianfei Fu, Yang Jin |
Research on Grid Resource Reliability Model Based on Promise. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
resource reliability, promise, signaling game, grid computing, market |
11 | Joaquín García 0001, Frédéric Cuppens, Fabien Autrel, Jordi Castellà-Roca, Joan Borrell, Guillermo Navarro 0001, Jose A. Ortega-Ruiz |
Protecting On-Line Casinos against Fraudulent Player Drop-Out. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | MyungJoo Ham, Gul Agha |
ARA: A Robust Audit to Prevent Free-Riding in P2P Networks. |
Peer-to-Peer Computing |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Doug Szajda, Barry Lawson 0001, Jason Owen |
Toward an Optimal Redundancy Strategy for Distributed Computations. |
CLUSTER |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Alfredo De Santis, Barbara Masucci |
Anonymous Membership Broadcast Schemes. |
Des. Codes Cryptogr. |
2004 |
DBLP DOI BibTeX RDF |
anonymity, permutation groups, pseudorandom permutations |
11 | Fábio Reis Cecin, Rafael de Oliveira Jannone, Cláudio F. R. Geyer, Márcio Garcia Martins 0002, Jorge L. V. Barbosa |
FreeMMG: a hybrid peer-to-peer and client-server model for massively multiplayer games. |
NETGAMES |
2004 |
DBLP DOI BibTeX RDF |
cheat-proof games, peer-to-peer, massively multiplayer games |
11 | Boaz Barak, Rafael Pass |
On the Possibility of One-Message Weak Zero-Knowledge. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Ivan Damgård, Serge Fehr, Kirill Morozov, Louis Salvail |
Unfair Noisy Channels and Oblivious Transfer. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Andris Ambainis, Markus Jakobsson, Helger Lipmaa |
Cryptographic Randomized Response Techniques. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
randomized response technique, privacy, privacy-preserving data-mining, oblivious transfer, polling, binary symmetric channel |
11 | Ko-Kang Chu, Maiga Chang, Yen-Teh Hsia |
A hybrid training mechanism for applying neural networks to Web-based applications. |
SMC (4) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Feng Bao 0001, Guilin Wang, Jianying Zhou 0001, Huafei Zhu |
Analysis and Improvement of Micali's Fair Contract Signing Protocol. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Philippe Golle, Ari Juels |
Dining Cryptographers Revisited. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Chris GauthierDickey, Daniel Zappala, Virginia Mary Lo, James Marr |
Low latency and cheat-proof event ordering for peer-to-peer games. |
NOSSDAV |
2004 |
DBLP DOI BibTeX RDF |
cheat-proof, peer-to-peer, interactive, games, distributed, low-latency |
11 | Jean-Pierre Hubaux |
Rational behaviors in hotspots and in ad hoc networks. |
MSWiM |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Tianjie Cao, Dongdai Lin, Rui Xue 0001 |
Security Analysis of User Efficient Blind Signatures. |
AWCC |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Chunbo Ma, Dake He |
A New Chameleon Multi-signature Based on Bilinear Pairing. |
GCC Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Kemal Bicakci, Nazife Baykal |
Server Assisted Signatures Revisited. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
server-assisted signature, pervasive computing, digital signature, one-time signature |
11 | Adam Wierzbicki, Tomasz Kucharski |
P2P Scrabble. Can P2P Games Commence? |
Peer-to-Peer Computing |
2004 |
DBLP DOI BibTeX RDF |
peer-to-peer, distributed hash tables, secret sharing, trust management, commitment protocols |
11 | Markus Jakobsson, Jean-Pierre Hubaux, Levente Buttyán |
A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. |
Financial Cryptography |
2003 |
DBLP DOI BibTeX RDF |
multi-hop cellular networks, routing, collaboration, detection, Audit, rational, micro-payment |
Displaying result #601 - #700 of 755 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ >>] |
|