-
1
-
-
74049102823
-
Provable data possession at untrusted stores
-
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proc. 14th ACM Conference on Computer and Communication Security, CCS (2007)
-
Proc. 14th ACM Conference on Computer and Communication Security, CCS (2007)
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
2
-
-
84869471413
-
Recommendation for key management II: Best practices for key management organization
-
Barker, E., Barker, W., Polk, W., Smid, M.: Recommendation for key management II: Best practices for key management organization. NIST SP (2/3), 1-79 (2005)
-
(2005)
NIST SP
, Issue.2-3
, pp. 1-79
-
-
Barker, E.1
Barker, W.2
Polk, W.3
Smid, M.4
-
4
-
-
40249118370
-
Bridging Game Theory and Cryptography: Recent Results and Future Directions
-
Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
-
Katz, J.: Bridging Game Theory and Cryptography: Recent Results and Future Directions. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 251-272. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 251-272
-
-
Katz, J.1
-
6
-
-
79959875003
-
-
Technical report, EPFL
-
Manshaei, M., Zhu, Q., Alpcan, T., Basar, T., Hubaux, J.P.: Game Theory Meets Network Security and Privacy. Technical report, EPFL (2010)
-
(2010)
Game Theory Meets Network Security and Privacy
-
-
Manshaei, M.1
Zhu, Q.2
Alpcan, T.3
Basar, T.4
Hubaux, J.P.5
-
7
-
-
78751561458
-
Would a "cyber warrior" protect us? Exploring tradeoffs between attack and defense of information systems
-
Moore, T., Friedman, A., Procaccia, A.:Would a "cyber warrior" protect us? Exploring tradeoffs between attack and defense of information systems. In: NSPW, pp. 85-94 (2010)
-
(2010)
NSPW
, pp. 85-94
-
-
Moore, T.1
Friedman, A.2
Procaccia, A.3
-
9
-
-
70449485072
-
Security games with incomplete information
-
Nguyen, K.C., Alpcan, T., Basar, T.: Security games with incomplete information. In: Proc. IEEE International Conference on Communications, ICC (2009)
-
Proc. IEEE International Conference on Communications, ICC (2009)
-
-
Nguyen, K.C.1
Alpcan, T.2
Basar, T.3
-
10
-
-
84861164891
-
Gaming security by obscurity
-
abs/1109.5542
-
Pavlovic, D.: Gaming security by obscurity, CoRR abs/1109.5542 (2011)
-
(2011)
CoRR
-
-
Pavlovic, D.1
-
12
-
-
84866651452
-
Illegitimi non carborundum
-
Invited keynote talk given at August 15
-
Rivest, R.L.: Illegitimi non carborundum. Invited keynote talk given at CRYPTO 2011 (August 15, 2011), http://people.csail.mit.edu/rivest/pubs. html#Riv11b
-
(2011)
CRYPTO 2011
-
-
Rivest, R.L.1
-
13
-
-
77951729734
-
A survey of game theory as applied to network security
-
Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A survey of game theory as applied to network security. In: Int. Conf. on System Sciences (HICSS), pp. 1-10 (2010)
-
(2010)
Int. Conf. on System Sciences (HICSS)
, pp. 1-10
-
-
Roy, S.1
Ellis, C.2
Shiva, S.3
Dasgupta, D.4
Shandilya, V.5
Wu, Q.6
-
14
-
-
84890431525
-
FlipIt: The game of "stealthy takeover"
-
To appear in
-
van Dijk, M., Juels, A., Oprea, A., Rivest, R.L.: FlipIt: The game of "stealthy takeover". To appear in Journal of Cryptology (2012)
-
(2012)
Journal of Cryptology
-
-
Van Dijk, M.1
Juels, A.2
Oprea, A.3
Rivest, R.L.4
|