نتایج جستجو برای: security game
تعداد نتایج: 279601 فیلتر نتایج به سال:
Security questions are one of the techniques used in fall-back authentication to retrieve forgotten passwords. This paper proposes a game design which aims to improve usability of system-generated security questions. In our game design, we adapted the popular picture-based “4 Pics 1 word” mobile game. This game asks users to pick the word that relates the given pictures. We selected this game b...
The game-based approach to security proofs in cryptography is a widely-used methodology for writing proofs rigorously. However a unifying language for writing games is still missing. In this paper we show how CSLR, a probabilistic lambda-calculus with a type system that guarantees that computations are probabilistic polynomial time, can be equipped with a notion of game indistinguishability. Th...
Higo, Tanaka, Yamada, and Yasunaga (ACISP 2012) studied oblivious transfer (OT) from a game-theoretic viewpoint in the malicious model. Their work can be considered as an extension of the study on two-party computation in the fail-stop model by Asharov, Canetti, and Hazay (EUROCRYPT 2011). This paper focuses on bit commitment, and continues to study it from a perspective of game theory. In a si...
MANET is the collection of various wireless mobile nodes. Security is of high concern in mobile ad hoc network as it has no centralized authority which can oversee the particular node working in the network. The attacks can be preformed from both inside and outside the network. Nodes within surrounding to gain common radio link can be often used to set up ad hoc infrastructure. But the safe com...
ABSTRACT In this paper the entropy function of the matrix game has been considered as one of the objectives and formulate a new game model, named Entropy Matrix Goal Game Model. Non-linear programming model for each player has been established. The equilibrium condition on matrix game is based on expected pay-off, so this equilibrium condition might be violated by mixed strategies when replicat...
We consider a network security classification game in which a strategic defender decides whether an attacker is a strategic spy or a naive spammer based on an observed sequence of attacks on fileor mail-servers. The spammer’s goal is attacking the mail-server, while the spy’s goal is attacking the file-server as much as possible before detection. The defender observes for a length of time that ...
Privacy preservation in the information society is in many respects parallel to environment preservation in the physical world. In this way, “green ICT services” are those achieving functionality and security with minimum invasion of the privacy of individuals, where such an invasion can be regarded as a kind of pollution as harmful in the long run to their moral welfare as physical pollution i...
A wealth of algorithms centered around (integer) linear programming have been proposed to compute equilibrium strategies in security games with discrete states and actions. However, in practice many domains possess continuous state and action spaces. In this paper, we consider a continuous space security game model with infinite-size action sets for players and present a novel deep learning bas...
Although computer security is a concern for online users, many have difficulty making effective security decisions. Auction Hero is a simulation game modeling life online that aims to improve users’ mental models of computer security and help users make more secure decisions. It attempts to simulate real life by making security a secondary consideration that requires vigilance but that may not ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید