메뉴 건너뛰기




Volumn 6016 LNCS, Issue PART 1, 2010, Pages 599-609

On the security enhancement of an efficient and secure event signature protocol for P2P MMOGs

Author keywords

Cryptanalysis; Hash functions; Massively multiplayer online games; Network security; One time signature; Peer to peer networks

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; HASH FUNCTIONS; INTERACTIVE COMPUTER GRAPHICS; PEER TO PEER NETWORKS; SOCIAL NETWORKING (ONLINE);

EID: 77952310897     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-12156-2_45     Document Type: Conference Paper
Times cited : (13)

References (21)
  • 1
    • 43649102584 scopus 로고    scopus 로고
    • An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games
    • Chan, M.-C., Hu, S.-Y., Jiang, J.-R.: An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games. Computer Networks 52(9), 1838-1845 (2008)
    • (2008) Computer Networks , vol.52 , Issue.9 , pp. 1838-1845
    • Chan, M.-C.1    Hu, S.-Y.2    Jiang, J.-R.3
  • 4
    • 57049115409 scopus 로고    scopus 로고
    • Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments
    • Li, C.-T., Hwang, M.-S., Chu, Y.-P.: Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments. Computer Communications 31(18), 4255-4258 (2008)
    • (2008) Computer Communications , vol.31 , Issue.18 , pp. 4255-4258
    • Li, C.-T.1    Hwang, M.-S.2    Chu, Y.-P.3
  • 5
    • 46749099079 scopus 로고    scopus 로고
    • A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
    • Li, C.-T., Hwang, M.-S., Chu, Y.-P.: A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks. Computer Communications 31(12), 2803-2814 (2008)
    • (2008) Computer Communications , vol.31 , Issue.12 , pp. 2803-2814
    • Li, C.-T.1    Hwang, M.-S.2    Chu, Y.-P.3
  • 6
    • 44549085989 scopus 로고    scopus 로고
    • An electronic voting protocol with deniable authentication for mobile ad hoc networks
    • Li, C.-T., Hwang, M.-S., Liu, C.-Y.: An Electronic Voting Protocol with Deniable Authentication for Mobile Ad Hoc Networks. Computer Communications 31(10), 2534-2540 (2008)
    • (2008) Computer Communications , vol.31 , Issue.10 , pp. 2534-2540
    • Li, C.-T.1    Hwang, M.-S.2    Liu, C.-Y.3
  • 7
    • 49549085074 scopus 로고    scopus 로고
    • Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks
    • Li, C.-T., Hwang, M.-S., Chu, Y.-P.: Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks. International Journal of Computer Systems Science and Engineering 23(3), 227-234 (2008)
    • (2008) International Journal of Computer Systems Science and Engineering , vol.23 , Issue.3 , pp. 227-234
    • Li, C.-T.1    Hwang, M.-S.2    Chu, Y.-P.3
  • 11
    • 70349788391 scopus 로고    scopus 로고
    • An enhanced remote user authentication scheme providing mutual authentication and key agreement with smart cards
    • Li, C.-T.: An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards. In: 5th International Conference on Information Assurance and Security, pp. 517-520 (2009)
    • (2009) 5th International Conference on Information Assurance and Security , pp. 517-520
    • Li, C.-T.1
  • 13
    • 70349809938 scopus 로고    scopus 로고
    • Cryptanalysis of threshold password authentication against guessing attacks in ad hoc networks
    • Li, C.-T., Chu, Y.-P.: Cryptanalysis of threshold password authentication against guessing attacks in ad hoc networks. International Journal of Network Security 8(2), 166-168 (2009)
    • (2009) International Journal of Network Security , vol.8 , Issue.2 , pp. 166-168
    • Li, C.-T.1    Chu, Y.-P.2
  • 14
    • 77952307259 scopus 로고    scopus 로고
    • An efficient and secure communication scheme for trusted computing environments
    • Li, C.-T.: An Efficient and Secure Communication Scheme for Trusted Computing Environments. Journal of Computers 20(3), 17-24 (2009)
    • (2009) Journal of Computers , vol.20 , Issue.3 , pp. 17-24
    • Li, C.-T.1
  • 15
    • 69949155644 scopus 로고    scopus 로고
    • An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor networks
    • Li, C.-T., Hwang, M.-S., Chu, Y.-P.: An Efficient Sensor-To-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks. International Journal of Innovative Computing, Information and Control 5(8), 2107-2124 (2009)
    • (2009) International Journal of Innovative Computing, Information and Control , vol.5 , Issue.8 , pp. 2107-2124
    • Li, C.-T.1    Hwang, M.-S.2    Chu, Y.-P.3
  • 16
    • 74349090986 scopus 로고    scopus 로고
    • A secure event update protocol for peer- to-peer massively multiplayer online games against masquerade attacks
    • Li, C.-T., Wei, C.-H., Chin, Y.-H.: A Secure Event Update Protocol for Peer- To-Peer Massively Multiplayer Online Games Against Masquerade Attacks. International Journal of Innovative Computing, Information and Control 5(12(A)), 4715-4723 (2009)
    • (2009) International Journal of Innovative Computing, Information and Control , vol.5 , Issue.12 A , pp. 4715-4723
    • Li, C.-T.1    Wei, C.-H.2    Chin, Y.-H.3
  • 17
    • 77952308617 scopus 로고    scopus 로고
    • A two-factor user authentication scheme providing mutual authentication and key agreement over insecure channels
    • Li, C.-T., Lee, C.-C., Wang, L.-J.: A Two-Factor User Authentication Scheme Providing Mutual Authentication and Key Agreement over Insecure Channels. Journal of Information Assurance and Security 5(1), 201-208 (2010)
    • (2010) Journal of Information Assurance and Security , vol.5 , Issue.1 , pp. 201-208
    • Li, C.-T.1    Lee, C.-C.2    Wang, L.-J.3
  • 19
    • 70349792182 scopus 로고    scopus 로고
    • An efficient biometrics-based remote user authentication scheme using smart cards
    • Li, C.-T., Hwang, M.-S.: An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards. Journal of Network and Computer Applications 33(1), 1-5 (2010)
    • (2010) Journal of Network and Computer Applications , vol.33 , Issue.1 , pp. 1-5
    • Li, C.-T.1    Hwang, M.-S.2
  • 21
    • 38149034349 scopus 로고    scopus 로고
    • A new nonrepudiable threshold proxy signature scheme with valid delegation period
    • Gervasi, O., Gavrilova, M.L. (eds.) Springer, Heidelberg
    • Hwang, M.-S., Tzeng, S.-F., Li, C.-T.: A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part III. LNCS, vol.4707, pp. 273-284. Springer, Heidelberg (2007)
    • (2007) ICCSA 2007, Part III. LNCS , vol.4707 , pp. 273-284
    • Hwang, M.-S.1    Tzeng, S.-F.2    Li, C.-T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.