<--- Back to Details
First PageDocument Content
Communications protocol / Data transmission / Protocols / Adversarial system / Social peer-to-peer processes / Sybil attack / Peer-to-peer / Adversary / Inference / Information / Data / Logic
Date: 2004-06-01 10:54:35
Communications protocol
Data transmission
Protocols
Adversarial system
Social peer-to-peer processes
Sybil attack
Peer-to-peer
Adversary
Inference
Information
Data
Logic

A Game-Theoretic Framework for Analyzing Trust-Inference Protocols Ruggero Morselli∗ Jonathan Katz∗

Add to Reading List

Source URL: www.cs.umd.edu

Download Document from Source Website

File Size: 108,49 KB

Share Document on Facebook

Similar Documents

Communications Protocol Category: Number: Audience: Issued: Owner:

Communications Protocol Category: Number: Audience: Issued: Owner:

DocID: 1vcl7 - View Document

Amateur Radio Continuous Wave Communications Protocol (CW ~ Morse Code) History and Application Tutorial

Amateur Radio Continuous Wave Communications Protocol (CW ~ Morse Code) History and Application Tutorial

DocID: 1uYVU - View Document

Florida Department of Transportation (FDOT) Actuated Traffic Signal Controller (ASC) Management Information Base (MIB) and National Transportation Communications for ITS (Intelligent Transportation Systems) Protocol (NTC

DocID: 1ufnI - View Document

Commercial in Confidence EVK LoRes Serial Communications Protocol

DocID: 1u5IT - View Document

MindSet Communications Protocol June 28, 2010 e NeuroSky product families consist of hardware and software components for simple integration of this biosensor technology into consumer and industrial end-applications.

MindSet Communications Protocol June 28, 2010 e NeuroSky product families consist of hardware and software components for simple integration of this biosensor technology into consumer and industrial end-applications.

DocID: 1tL86 - View Document