CORC

浏览/检索结果: 共9条,第1-9条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
Decentralization is Vulnerable Under the Gap Game 期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 90999-91008
作者:  Liu, Yiran;  Ke, Junming;  Xu, Qiuliang;  Jiang, Han;  Wang, Hao
收藏  |  浏览/下载:30/0  |  提交时间:2019/12/11
Optimal joint control and triggering strategies against denial of service attacks: a zero-sum game 期刊论文
IET CONTROL THEORY AND APPLICATIONS, 2017, 卷号: 11, 期号: 14, 页码: 2352-2360
作者:  Zhao, Yinghong;  He, Xiao;  Zhou, Donghua
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/11
A distributed game-theoretic approach for IaaS service trading in an auction-based cloud market 期刊论文
Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016, 2016, 页码: 1543-1550
作者:  Wei, Yi;  Pan, Li;  Yuan, Dong;  Liu, Shijun;  Wu, Lei
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/17
Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2015, 卷号: 8, 期号: 18, 页码: 3690-3700
作者:  Wang, Yilei;  Wong, Duncan S.;  Susilo, Willy;  Chen, Xiaofeng;  Xu, Qiuliang
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/17
Fair two-party computation with rational parties holding private types 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2015, 卷号: 8, 期号: 2, 页码: 284-297
作者:  Wang, Yilei;  Wong, Duncan S.;  Zhao, Chuan;  Xu, Qiuliang
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/17
New rational parties relying on reputation 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2014, 卷号: 7, 期号: 7, 页码: 1128-1137
作者:  Wang, Yilei;  Liu, Zhe;  Xu, Qiuliang
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/17
2-out-of-2 rational secret sharing in extensive form 期刊论文
Proceedings - 2011 7th International Conference on Computational Intelligence and Security, CIS 2011, 2011, 页码: 847-851
作者:  Wang, Yilei;  Xu, Qiuliang
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/23
Game-based verification of multi-party contract signing protocols 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010, 卷号: 5983 LNCS, 页码: 186-200
作者:  Zhang, Ying;  Zhang, Chenyi;  Pang, Jun;  Mauw, Sjouke
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/26
Intrusion response method based on attack graph 期刊论文
Ruan Jian Xue Bao/Journal of Software, 2008, 卷号: 19, 期号: 10, 页码: 2746-2753
作者:  Shi J.;  Guo S.-Q.;  Lu Y.;  Xie L.
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/26


©版权所有 ©2017 CSpace - Powered by CSpace