How to Protect Peer-to-Peer Online Games from Cheats
スポンサーリンク
概要
- 論文の詳細を見る
- 2004-12-14
著者
-
IMAI Hideki
University of Tokyo
-
Shigetomi Rie
University Of Tokyo Imai Laboratory Institute Of Industrial Science The University Of Tokyo
-
YOSHIMOTO Haruhiro
University of Tokyo, Imai Laboratory, Institute of Industrial Science, The University of Tokyo
-
Yoshimoto Haruhiro
University Of Tokyo Imai Laboratory Institute Of Industrial Science The University Of Tokyo
-
Imai Hideki
University Of Tokyo Imai Laboratory Institute Of Industrial Science The University Of Tokyo
関連論文
- Information Theoretical Secure Oblivious Polynomial Evaluation : Model, Bounds and Constructions
- Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control(Application)(Cryptography and Information Security)
- How to Protect Peer-to-Peer Online Games from Cheats
- An Algorithm for Cryptanalysis of Certain Keystream Generators Suitable for High-Speed Software and Hardware Implementations : Special Section on Cryptography and Information Security
- A Novel Fast Correlation Attack Suitable for Simple Hardare Implementation
- Multilevel Coded 16-QAM Modulation with Multistage Decoding and Unequal Error Protection
- A Family of Fast Dedicated One-Way Hash Functions Based on Linear Cellular Automata over GF(q) (Special Section on Cryptography and Information Security)
- A Family of Fast Keystream Generators Based on Programmable Linear Cellular Automata over GF(q) and Time-Variant Table (Special Section on Cryptography and Information Security)
- Performance of SUD and MUD Interference Cancellation Receivers in Single-Cell and Multi-Cell CDMA Systems(Wireless Communication Technology)
- Sliced Onion Routing Scheme and its Aptitude for Sender-Identifiable Environments
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures : Special Section on Cryptography and Information Security
- Efficient Unconditionally Secure Digital Signatures (Asymmetric Cipher) (Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
- Deforestation and Degradation of Natural Resources in Ethiopia : Forest Management Implications from a Case Study in the Belete-Gera Forest
- New Short Signature Scheme without Random Oracles
- AT-2-2 A Survey on Recent Advances in Broadcast Encryption
- Adaptive Array Antenna Based on Spatial Spectral Estimation Using Maximum Entropy Method (Special Issue on Adaptive Signal Processing in Mobile Radio Communications)