-
1
-
-
70449462823
-
Virtual Economics: Applying Economics to the Study of Game Worlds
-
Michigan State University, Lansing. MI, USA, October 13-15
-
Vili Lehdonvirta: "Virtual Economics: Applying Economics to the Study of Game Worlds", Proceedings of the 2005 Conference on Future Play (Future Play 2005), Michigan State University, Lansing. MI, USA, October 13-15, 2005.
-
(2005)
Proceedings of the 2005 Conference on Future Play (Future Play 2005)
-
-
Lehdonvirta, V.1
-
3
-
-
65049086470
-
Virtual Item Sales as a Revenue Model: Identifying Attributes that Drive Purchase Decisions
-
Vili Lehdonvirta: "Virtual Item Sales as a Revenue Model: Identifying Attributes that Drive Purchase Decisions", Electronic Commerce Research vol.9, no. 1, pp. 97-113.
-
Electronic Commerce Research
, vol.9
, Issue.1
, pp. 97-113
-
-
Lehdonvirta, V.1
-
4
-
-
0013194031
-
-
J. Franks, P. Hallam-Baker, J. Hosteller, S. Lawrence, P. Leach, A. Luotonen and L. Stewart. HTTP Authentication: Basic and Digest Access Authentication, 1999.
-
(1999)
HTTP Authentication: Basic and Digest Access Authentication
-
-
Franks, J.1
Hallam-Baker, P.2
Hosteller, J.3
Lawrence, S.4
Leach, P.5
Luotonen, A.6
Stewart, L.7
-
5
-
-
0021941417
-
The knowledge complexity of interactive proof-systems
-
New York, NY, USA, ACM Press
-
Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof-systems. In STOC '85: Proceedings of the seventeenth annual ACM symposium on Theory of computing, p291-304, New York, NY, USA, 1985. ACM Press.
-
(1985)
STOC '85: Proceedings of the seventeenth annual ACM symposium on Theory of computing
, pp. 291-304
-
-
Goldwasser1
Micali, S.2
Rackoff, C.3
-
6
-
-
84944878354
-
-
A. J. Menezes, S. A. Vanstone, and P. C. V. Oorschot. Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton, FL, USA. 1996.
-
A. J. Menezes, S. A. Vanstone, and P. C. V. Oorschot. Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton, FL, USA. 1996.
-
-
-
-
7
-
-
85015402934
-
Use of elliptic curves in cryptography
-
New York, NY, USA, Springer-Verlag New York, Inc
-
V. S. Miller, "Use of elliptic curves in cryptography", In Lecture notes in computer sciences; 218 on Advances in cryptology - CRYPTO 85. pages 417-426, New York, NY, USA, 1986. Springer-Verlag New York, Inc.
-
(1986)
Lecture notes in computer sciences; 218 on Advances in cryptology - CRYPTO
, vol.85
, pp. 417-426
-
-
Miller, V.S.1
-
8
-
-
84968503742
-
Elliptic curve cryptosystems
-
Jan
-
N. Koblitz, "Elliptic curve cryptosystems", Mathematics of Computation, Vol. 48, No. 177. (Jan., 1987), pp. 203-209
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
9
-
-
33846283646
-
Hardening web browsers against man-in-the-middle and eavesdropping attacks
-
New York, NY, USA, ACM Press
-
H. Xia and J. C. Brustoloni, "Hardening web browsers against man-in-the-middle and eavesdropping attacks", In WWW '05: Proceedings of the 14th international conference on World Wide Web, pages 489-498. New York, NY, USA, 2005. ACM Press.
-
(2005)
WWW '05: Proceedings of the 14th international conference on World Wide Web
, pp. 489-498
-
-
Xia, H.1
Brustoloni, J.C.2
-
10
-
-
0014701097
-
An efficient algorithm for graph isomorphism
-
D. G. Cornell and C. C. Gotlieb. An efficient algorithm for graph isomorphism. J. ACM, 17(l):51-64, 1970.
-
(1970)
J. ACM
, vol.17
, Issue.L
, pp. 51-64
-
-
Cornell, D.G.1
Gotlieb, C.C.2
-
11
-
-
74349102506
-
-
Naveen Agarwal, Scott Renfro and Arturo Bejar. Current Anti-Phishing Solutions and Yahoo's Sign-in Seal. In W2SP: Workshop on Web 2.0 Security and Privacy 2007 held in conjunction with the 2007 IEEE Symposium on Security and Privacy, May 2007.
-
Naveen Agarwal, Scott Renfro and Arturo Bejar. Current Anti-Phishing Solutions and Yahoo's Sign-in Seal. In W2SP: Workshop on Web 2.0 Security and Privacy 2007 held in conjunction with the 2007 IEEE Symposium on Security and Privacy, May 2007.
-
-
-
-
12
-
-
0033686899
-
-
Anna Bouch, Allan Kuchinsky and Nina Bhatti. Quality is in the eye of the beholder: meeting users, Äô requirements for Internet quality of service. In CHI'00: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 297-304, New York, NY, USA. 2000. ACM Press.
-
Anna Bouch, Allan Kuchinsky and Nina Bhatti. Quality is in the eye of the beholder: meeting users, Äô requirements for Internet quality of service. In CHI'00: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 297-304, New York, NY, USA. 2000. ACM Press.
-
-
-
-
13
-
-
74349111143
-
-
L. Babai, P. Erdos, and S. M. Selkow. Random graph isomorphism. SIAM Journal on Computing
-
L. Babai, P. Erdos, and S. M. Selkow. Random graph isomorphism. SIAM Journal on Computing,
-
-
-
-
14
-
-
35348884906
-
A large-scale study of web password habits
-
New York, NY, USA, ACM Press
-
D. Florencio and C. Herley. A large-scale study of web password habits. In WWW '07: Proceedings of the 16th international conference on World Wide Web, pages 657-666, New York, NY, USA, 2007. ACM Press.
-
(2007)
WWW '07: Proceedings of the 16th international conference on World Wide Web
, pp. 657-666
-
-
Florencio, D.1
Herley, C.2
-
15
-
-
33745788833
-
Fast dictionary attacks on passwords using time-space tradeoff
-
New York, NY, USA, ACM
-
A. Narayanan and V. Shmatikov. Fast dictionary attacks on passwords using time-space tradeoff. In CCS '05: Proceedings of the 12th ACM conference on Computer and communications security, pages 364-372. New York, NY, USA, 2005. ACM.
-
(2005)
CCS '05: Proceedings of the 12th ACM conference on Computer and communications security
, pp. 364-372
-
-
Narayanan, A.1
Shmatikov, V.2
-
16
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
L. Gong, M. A. Lomas, R. M. Needham, and J. H. Saltzer. Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications, 11(5):648-656, 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.A.2
Needham, R.M.3
Saltzer, J.H.4
-
19
-
-
74349086643
-
-
http://www.iacr.org/conferences/crypto2005/rumpSchedule.html
-
-
-
-
20
-
-
74349084292
-
Fingerprinting your files
-
August, also at
-
S. Garfinkel. "Fingerprinting your files" in MIT technology review technical report, August 2004. (also at: http://beta.technologyreview. com/computing/13718/)
-
(2004)
in MIT technology review technical report
-
-
Garfinkel, S.1
-
21
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
S.M.Bellovin and M. Merritt, "Encrypted key exchange: Password-based protocols secure against dictionary attacks", in Research in Security and Privacy, 1992. Proceedings., 1992 IEEE Computer Society Symposium, Pages 72-84.
-
Research in Security and Privacy, 1992. Proceedings., 1992 IEEE Computer Society Symposium
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
22
-
-
0030261758
-
Strong password-only authenticated key exchange
-
D. P. Jablon. Strong password-only authenticated key exchange. SIGCOMM Comput. Commun. Rev., 26(5):5-26, 1996.
-
(1996)
SIGCOMM Comput. Commun. Rev
, vol.26
, Issue.5
, pp. 5-26
-
-
Jablon, D.P.1
-
27
-
-
74349090251
-
D-FOAF - Security Aspects in Distributed User Management System
-
S. Grzonkowski, A. Gzella, H. K. Krawczyk, S. R. Kruk, F. J. Martin. R. Moyano and T. Woroniecki., "D-FOAF - Security Aspects in Distributed User Management System", In Proceedings of IEEE International Conference of Technologies for Homeland Security and Safety. (TEHOSS 2005), 2005.
-
(2005)
Proceedings of IEEE International Conference of Technologies for Homeland Security and Safety. (TEHOSS
-
-
Grzonkowski, S.1
Gzella, A.2
Krawczyk, H.K.3
Kruk, S.R.4
Martin, F.J.5
Moyano, R.6
Woroniecki, T.7
-
29
-
-
74349128322
-
Community-aware Ontologies
-
S. R. Kruk and B. McDaniel. editors, Springer, ISBN: 978-3-540-85433-3
-
S. Grzonkowski, S. R. Kruk, A. Gzella, J. Demczuk and B. McDaniel. "Community-aware Ontologies", In S. R. Kruk and B. McDaniel. editors, "Semantic Digital Libraries", pages 125-139. Springer, 2008. ISBN: 978-3-540-85433-3.
-
(2008)
Semantic Digital Libraries
, pp. 125-139
-
-
Grzonkowski, S.1
Kruk, S.R.2
Gzella, A.3
Demczuk, J.4
McDaniel, B.5
-
33
-
-
33645120000
-
Whose game is this anyway? Negotiating corporate ownership in a virtual world
-
Frans Mäyrä Ed, Tampere: Tampere University Press
-
T. L.Taylor, "Whose game is this anyway? Negotiating corporate ownership in a virtual world", In Frans Mäyrä (Ed.), Computer Games and Digital Cultures Conference Proceedings, (pp. 227-242). Tampere: Tampere University Press, 2002
-
(2002)
Computer Games and Digital Cultures Conference Proceedings
, pp. 227-242
-
-
Taylor, T.L.1
-
34
-
-
74349092768
-
-
I. Machines, Y. J. Park,. and S. M. Whang, Virtual World Governance: Digital Item Trade and its Consequences in Korea. TPRC Conference Paper, 2004.
-
I. Machines, Y. J. Park,. and S. M. Whang, "Virtual World Governance: Digital Item Trade and its Consequences in Korea". TPRC Conference Paper, 2004.
-
-
-
-
35
-
-
74349111908
-
Server Architectures for Massive Multiplayer Online Games
-
J. Kesselman, "Server Architectures for Massive Multiplayer Online Games", Sun Worldwide Developer Conference 2004.
-
(2004)
Sun Worldwide Developer Conference
-
-
Kesselman, J.1
|