Author of the publication

Trust management for cheating detection in distributed massively multiplayer online games.

, , and . NetGames, page 40-42. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incentive Compatible Distributed Data Mining., and . SocialCom/PASSAT, page 735-742. IEEE Computer Society, (2010)First Steps Towards Predicting the Readability of Programming Error Messages., , , , , , and . SIGCSE (1), page 549-555. ACM, (2023)Contractual Agreement Design for Enforcing Honesty in Cloud Outsourcing., and . GameSec, volume 7638 of Lecture Notes in Computer Science, page 296-308. Springer, (2012)Trust management for cheating detection in distributed massively multiplayer online games., , and . NetGames, page 40-42. IEEE, (2017)Incentive Compatible Privacy-Preserving Distributed Classification., and . IEEE Trans. Dependable Secur. Comput., 9 (4): 451-462 (2012)Efficient Query Verification on Outsourced Data: A Game-Theoretic Approach, and . CoRR, (2012)Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data., , and . DBSec, volume 7371 of Lecture Notes in Computer Science, page 129-144. Springer, (2012)A game theoretic approach for adversarial pipeline monitoring using Wireless Sensor Networks., , and . IRI, page 37-44. IEEE, (2012)An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining., , and . PAKDD, volume 5476 of Lecture Notes in Computer Science, page 515-524. Springer, (2009)Towards Assessing the Readability of Programming Error Messages., , , , , and . ACE, page 181-188. ACM, (2021)