-
2
-
-
51049124266
-
Providing receipt freeness in mix-net based voting protocols
-
B. Lee, C. Boyd, E. Dawson, K. Kim, J. Yang and S. Yahoo, ''Providing receipt freeness in mix-net based voting protocols'', Proc.- Sixth International Conference on Information Security and Cryptology, Seoul, 2003.
-
(2003)
Proc Sixth International Conference on Information Security and Cryptology, Seoul
-
-
Lee, B.1
Boyd, C.2
Dawson, E.3
Kim, K.4
Yang, J.5
Yahoo, S.6
-
3
-
-
44649144215
-
A Survey of Solutions to The Sybil Attack
-
University of Massachusetts, Amherst, MA
-
B.N. Levine, C. Shields and N.B. Margolin, ''A Survey of Solutions to the Sybil Attack'', Tech. Report, University of Massachusetts, Amherst, MA, 2006.
-
(2006)
Tech. Report
-
-
Levine, B.N.1
Shields, C.2
Margolin, N.B.3
-
4
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and counter measurements
-
C. Karlof and D. Wagner, ''Secure routing in wireless sensor networks: Attacks and counter measurements'', Ad hoc networks Journal (Elsevier) 1 (2-3), 2003, pp. 293-315.
-
(2003)
Ad Hoc Networks Journal (Elsevier)
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
7
-
-
3042785862
-
The Sybil attack in sensor networks: Analyses & defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig, ''The Sybil attack in sensor networks: analyses & defenses'', Proceedings of IPSN Intl Symposium, 2004, pp. 259-268.
-
(2004)
Proceedings of IPSN Intl Symposium
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
8
-
-
0347031344
-
The effect of false-name bids in combinatorial auctions: New fraud in internet auctions
-
M. Yokoo, Y. Sakurai and S. Matsubara, ''The effect of false-name bids in combinatorial auctions: new fraud in internet auctions'', Games and Economic Behavior, vol. 46, No. 1, 2004, pp. 174-188.
-
(2004)
Games and Economic Behavior
, vol.46
, Issue.1
, pp. 174-188
-
-
Yokoo, M.1
Sakurai, Y.2
Matsubara, S.3
-
9
-
-
38549153988
-
Quantifying and discouraging sybil attacks
-
University of Massachusetts Amherst
-
N.B. Margolin and B.N. Levine, ''Quantifying and discouraging sybil attacks'', Tech. Rep 2005-67, University of Massachusetts Amherst, 2005.
-
(2005)
Tech. Rep 2005-67
-
-
Margolin, N.B.1
Levine, B.N.2
-
13
-
-
78651561504
-
A study of several privacy-preserving multi-party negotiation problems with applications to supply chain management
-
Indian Institute of Management Calcutta (unpublished)
-
S. Chakraborty, ''A study of several privacy-preserving multi-party negotiation problems with applications to supply chain management'' Doctoral dissertation, Indian Institute of Management Calcutta, 2007 (unpublished).
-
(2007)
Doctoral dissertation
-
-
Chakraborty, S.1
-
14
-
-
33745789036
-
An auctioning reputation system based on anomaly
-
S. Rubin, M. Christodorescu, V. Ganapathy, J.T. Giffin, L. Kruger, H. Wang and N. Kidd, ''An auctioning reputation system based on anomaly'', Proceedings of ACM conference on Computer and Communications Security, 2005, pp. 270-279.
-
(2005)
Proceedings of ACM conference on Computer and Communications Security
, pp. 270-279
-
-
Rubin, S.1
Christodorescu, M.2
Ganapathy, V.3
Giffin, J.T.4
Kruger, L.5
Wang, H.6
Kidd, N.7
-
16
-
-
78651576554
-
Sybilguard: Defending against Sybil attacks via social networks
-
September 11-15, Pisa, Italy
-
Y. Haifeng, M. Kaminsky, P.B. Gibbons and A. Flaxman, ''Sybilguard: Defending against Sybil attacks via social networks'', ACM Sigcomm'06, September 11-15, 2006, Pisa, Italy.
-
(2006)
ACM Sigcomm'06
-
-
Haifeng, Y.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
17
-
-
33750012404
-
Access control in wireless sensor networks
-
Y. Zhou, Y. Zhang and Y. Fang, ''Access control in wireless sensor networks'', Adhoc networks, Volume 5, 2007, pp. 3-13.
-
(2007)
Adhoc Networks
, vol.5
, pp. 3-13
-
-
Zhou, Y.1
Zhang, Y.2
Fang, Y.3
|