• Publications
  • Influence
Robust incentive techniques for peer-to-peer networks
TLDR
We propose the Reciprocative decision function as the basis of a family of incentives techniques that can drive a system of strategic users to nearly optimal levels of cooperation. Expand
  • 644
  • 47
  • PDF
Pricing Multicast Communication: A Cost-Based Approach
TLDR
A cost-based approach to multicast pricing, based on accurate characterization of multicast scalability, will facilitate the efficient and equitable resource allocation between traffic types. Expand
  • 231
  • 30
  • PDF
Free-riding and whitewashing in peer-to-peer systems
TLDR
We devise a model to study the phenomenon of free-riding and free-identities in peer-to-peer systems. Expand
  • 397
  • 26
  • PDF
Secure or insure?: a game-theoretic analysis of information security games
TLDR
We propose to investigate security investment decision-making in established (e.g., weakest-link, best-shot) and novel games, and describe Nash equilibria and social optima for different classes of attacks and defenses. Expand
  • 243
  • 14
  • PDF
Incentives for Cooperation in Peer-to-Peer Networks
TLDR
To model this problem, we use the Evolutionary Prisoner’s Dilemma (EPD) [3] to capture the tension between individual and social utility. Expand
  • 236
  • 12
  • PDF
I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves
TLDR
We propose and evaluate different classes of mental and/or motor tasks that users may perform while wearing a headset with EEG sensors. Expand
  • 124
  • 11
  • PDF
Overcoming free-riding behavior in peer-to-peer systems
TLDR
This paper surveys recent research at the intersection of economics and computer science that targets the design of distributed systems consisting of rational participants with diverse and selfish interests that threatens the viability of these systems. Expand
  • 284
  • 10
  • PDF
A case for taxation in peer-to-peer streaming broadcast
TLDR
In the taxation model, resource-rich peers contribute more bandwidth to the system, and subsidize for the resource-poor peers. Expand
  • 128
  • 10
  • PDF
Distributed authentication in Kerberos using public key cryptography
  • M. Sirbu, J. Chuang
  • Computer Science
  • Proceedings of SNDSS '97: Internet Society…
  • 10 February 1997
TLDR
The authors describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. Expand
  • 88
  • 8
  • PDF
Content availability, pollution and poisoning in file sharing peer-to-peer networks
TLDR
We conduct a measurement study of content availability in four popular peer-to-peer file sharing networks, in the absence of poisoning, and then simulate different poisoning strategies on the measured data to evaluate their potential impact. Expand
  • 212
  • 7
  • PDF