Incentives for sharing in peer-to-peer networks
Proceedings of the 3rd ACM conference on Electronic Commerce
Pricing via Processing or Combatting Junk Mail
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Weakly Secret Bit Commitment: Applications to Lotteries and Fair Exchange
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
A Game Theoretic Framework for Incentives in P2P Systems
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
Admission control in Peer-to-Peer: design and performance evaluation
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Moderately hard, memory-bound functions
ACM Transactions on Internet Technology (TOIT)
Game Theory As A Tool To Strategize As Well As Predict Nodes Behavior In Peer-to-Peer Networks
ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems - Volume 01
Enhancing Data Authenticity and Integrity in P2P Systems
IEEE Internet Computing
A Bayesian framework for online reputation systems
AICT-ICIW '06 Proceedings of the Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services
A Protocol for Secure Content Distribution in Pure P2P Networks
DEXA '06 Proceedings of the 17th International Conference on Database and Expert Systems Applications
Certificate-based Access Control in Pure P2P Networks
P2P '06 Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing
International Journal of Information Security
Building trust in peer-to-peer systems: a review
International Journal of Security and Networks
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Formal proof of cooperativeness in a multi-party P2P content authentication protocol
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
The Peer's Dilemma: A general framework to examine cooperation in pure peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication, content integrity or access control, presents several difficulties, most of them due to the decentralized nature of these environments and the lack of central authorities. Even though some solutions have been already proposed, a usual problem is how to formally reasoning about their security properties. In this work, we show how Game Theory -particularly Bayesian games- can be an useful tool to analyze in a formal manner a P2P security scheme. We illustrate our approach with a secure content distribution protocol, showing how nodes can dynamically adapt their strategies to highly transient communities. In our model, some security aspects rest on the formal proof of the robustness of the distribution protocol, while other properties stem from notions such as rationality, cooperative security, beliefs, or best-response strategies.