메뉴 건너뛰기




Volumn , Issue , 2011, Pages 506-520

OpenConflict: Preventing real time map hacks in online games

Author keywords

Map hacks; Multi player games

Indexed keywords

COMPUTER SOFTWARE;

EID: 80051990340     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2011.28     Document Type: Conference Paper
Times cited : (34)

References (26)
  • 1
    • 85177677494 scopus 로고    scopus 로고
    • Essential Facts 2010.PDF
    • E. S. Association. Essential game facts 2009. http://www.theesa.com/ facts/pdfs/ESA Essential Facts 2010.PDF, 2010.
    • (2009) Essential Game Facts
  • 7
    • 84989256579 scopus 로고    scopus 로고
    • C. engine team. Cheat engine. http://www.cheatengine.org/.
    • Cheat Engine
  • 8
    • 1142263341 scopus 로고    scopus 로고
    • Limiting privacy breaches in privacy preserving data mining
    • A. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In PODS'03, pages 211-222, 2003.
    • (2003) PODS'03 , pp. 211-222
    • Evfimievski, A.1    Gehrke, J.2    Srikant, R.3
  • 13
    • 40249108370 scopus 로고    scopus 로고
    • Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
    • C. Hazay and Y. Lindell. Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In Proc. of TCC'08, pages 155-175, 2008.
    • (2008) Proc. of TCC'08 , pp. 155-175
    • Hazay, C.1    Lindell, Y.2
  • 14
    • 79955547393 scopus 로고    scopus 로고
    • Efficient set operations in the presence of malicious adversaries
    • C. Hazay and K. Nissim. Efficient set operations in the presence of malicious adversaries. In Proc. of PKC 2010, volume 6056 of LNCS, pages 312-331, 2010.
    • (2010) Proc. of PKC 2010, Volume 6056 of LNCS , pp. 312-331
    • Hazay, C.1    Nissim, K.2
  • 15
    • 70349142321 scopus 로고    scopus 로고
    • Hacking world of warcraft: An exercise in advanced rootkit design
    • G. Hoglund. Hacking world of warcraft: An exercise in advanced rootkit design. In Black Hat, 2006.
    • (2006) Black Hat
    • Hoglund, G.1
  • 17
    • 70350656283 scopus 로고    scopus 로고
    • Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection
    • S. Jarecki and X. Liu. Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection. In Proc. of TCC'09, pages 577-594, 2009.
    • (2009) Proc. of TCC'09 , pp. 577-594
    • Jarecki, S.1    Liu, X.2
  • 22
    • 85174664325 scopus 로고    scopus 로고
    • Distributed execution with remote audit
    • F. Monrose, P. Wyckoff, and A. Rubin. Distributed execution with remote audit. In NDSS, 1999.
    • (1999) NDSS
    • Monrose, F.1    Wyckoff, P.2    Rubin, A.3
  • 24
    • 85177678171 scopus 로고    scopus 로고
    • So many ways to slap a yo-ho:: Xploiting yoville and facebook for fun and profit
    • S. M. W. to
    • S. M. W. to Slap A Yo-Ho:: Xploiting Yoville, F. for Fun, P. Strace, S. Barnum, Evil Adam Smith, Kanen, and J. Tyson. So many ways to slap a yo-ho:: Xploiting yoville and facebook for fun and profit. Defcon 18, 2010.
    • (2010) Defcon , vol.18
    • Yo-Ho, S.A.1    Yoville, X.2    Fun, F.3    Strace, P.4    Barnum, S.5    Smith, E.A.6    Kanen7    Tyson, J.8
  • 26
    • 85177679526 scopus 로고    scopus 로고
    • Wikipedia. The blizzard warden. http://en.wikipedia.org/wiki/Warden- (software).
    • The Blizzard Warden


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.