|
[1] ANSI/IEEE Standard 754-1985. Standard for binary floating point arithmetic. [2] Jacob R. Lorch Thomas Moscibroda Jeffrey Pang Srinivasan Seshan Ashwin Bharambe, John R. Douceur and Xinyu Zhuang. Donnybrook: Enabling large-scale, high-speed, peer-to-peer games. In Proceedings of SIGCOMM, 2008. [3] N.E. Baughman and B.N. Levine. Cheat-proof playout for centralized and distributed online games. In Proceedings of INFOCOM, volume 1, pages 104–113, 2001. [4] M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. Eurocrypt 2000 (LNCS 1807), pages 139–155, 2000. [5] M. Bellare and P. Rogaway. Optimal asymmetric encryption. Eurocrypt’94, pages 92–111, 1994. [6] Francesco Bergadano, Davide Cavagnino, and Bruno Crispo. Chained stream authentication. In Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography, volume 2012 of Lecture Notes In Computer Science, pages 144–157. Springer-Verlag, 2000. [7] Ashwin Bharambe, Jeffery Pang, and Srinivasan Seshan. Colyseus: a distributed architecture for online multiplayer games. In Proceedings of the 3rd conference on 3rd Symposium on Networked Systems Design & Implementation, volume 3, pages 12–12, San Jose, CA, 2006. [8] Jean Botev, Alexander Hohfeld, Hermann Schloss, Ingo Scholtes, Peter Sturm, and Markus Esch. The HyperVerse: concepts for a federated and torrent-based ’3D web’. International Journal of Advanced Media and Communication, 2(4):331–350, 2008. [9] David M. Burton. Elementary Number Theory, 6th Edition. ACM Press, 2005. [10] Romain Cavagna, Christian Bouville, and Jerome Royan. P2P network for very large virtual environment. In Proceedings of the ACM symposium on Virtual reality software and technology, pages 269–276, New York, NY, USA, 2006. ACM. [11] Mo-Che Chan, Shun-Yun Hu, and Jehn-Ruey Jiang. An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games. Compututer Networks, 52(9):1838–1845, 2008. [12] Mo-Che Chan, Shun-Yun Hu, and Jehn-Ruey Jiang. Secure peer-to-peer 3D streaming. Multimedia Tools and Applications, 45(1-3):369–384, October 2009. [13] Mo-Che Chan, Jehn-Ruey Jiang, Chao-Wei Hung, and Wei Tsang Ooi. Group-based peer-to-peer 3D streaming authentication. In Proceedings of the 15th International Conference on Parallel and Distributed Systems (ICPADS), pages 685 –691, December 2009. [14] Chien-nan Chen, Cing-yu Chu, Su-ling Yeh, Hao-hua Chu, and Polly Huang. Measuring the perceptual quality of skype sources. SIGCOMM Computer Communication Review, 42(4):521–526, September 2012. [15] Kuan-Ta Chen, Polly Huang, and Chin-Laung Lei. Game traffic analysis: An MMORPG perspective. Computer Networks, 50(16):3002–3023, November 2006. [16] Wei Cheng and Wei Tsang Ooi. Receiver-driven view-dependent streaming of progressive mesh. In Proceedings of NOSSDAV, 2008. [17] Wei Cheng, Wei Tsang Ooi, Sebastien Mondet, Romulus Grigoras, and Géraldine Morin. An analytical model for progressive mesh streaming. In Proceedings of the ACM Multimedia 2007, pages 737–746, Augsburg, Germany, September 2007. [18] Daniel Cohen, Nick Sevdalis, David Taylor, Karen Kerr, Mick Heys, Keith Willett, Nicola Batrick, and Ara Darzi. Emergency preparedness in the 21st century: Training and preparation modules in virtual environments. Resuscitation, 84(1):78 – 84, 2013. [19] A.B. Corman, S. Douglas, P. Schachte, and V. Teague. A secure event agreement (SEA) protocol for peer-to-peer games. In Proceedings of the 1st International Conference on Availability, Reliability and Security, 2006. [20] E. Cronin, B. Filstrup, and S. Jamin. Cheat-proofing dead reckoned multiplayer games. In Proceedings of Application and Development of Computer Games, 2003. [21] Wei Dai. Crypto++ benchmarks. http://www.cryptopp.com/ benchmarks.html. [22] Wei Dai. Crypto++ library. http://www.cryptopp.com. [23] C.G. Dickey, D. Zappala, V. Lo, and J. Marr. Low latency and cheat-proof event ordering for peer-to-peer games. In Proceedings of ACM International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV), Kinsale, County Cork, Ireland, pages 134–139, 2004. [24] C. Diot and L. Gautier. A distributed architecture for multiplayer interactive application on the internet. In IEEE Networks, volume 13, July 1999. [25] Scott Douglas, Egemen Tanin, Aaron Harwood, and Shanika Karunasekera. Enabling massively multi-player online gaming applications on a P2P architecture. In Proceedings of the IEEE International Conference on Information and Automation, pages 7–12, December 2005. [26] Blizzard Entertainment. World of warcraft. http://us.battle.net/wow/ en/. [27] Davide Frey, Jérôme Royan, Romain Piegay, Anne marie Kermarrec, Fabrice Le Fessant, and Emmanuelle Anceaume. Solipsis: A decentralized architecture for virtual environments. In Proceedings of the 1st International Workshop on Massively Multiuser Virtual Environments (MMVE), 2008. [28] C. GauthierDickey, V. Lo, and D. Zappala. Using n-trees for scalable event ordering in peer-to-peer games. In Proceedings of the international workshop on Network and operating systems support for digital audio and video, pages 87–92. ACM Press New York, NY, USA, 2005. [29] Laurent Gautier, Christophe Diot, and Jim Kurose. End-to-end transmission control mechanisms for multiparty interactive applications on the internet. In Proceedings of IEEE INFOCOM, 1999. [30] Rosario Gennaro and Pankaj Rohatgi. How to sign digital streams. In Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, Lecture Notes In Computer Science 1294, pages 180 – 197, 1997. [31] Yan Gu and Wei Tsang Ooi. Packetization of 3D progressive meshes for streaming over lossy networks. In Proceedings of the 14th International Conference on Computer Communications and Networks (ICCCN), San Diego, CA, October 2005. [32] Satyandra K. Gupta, Davinder K. Anand, John E. Brough, Maxim Schwartz, and Robert A. Kavetsky. Training in Virtual Environments: A Safe, Cost-Effective, and Engaging Approach to Training. EPSC Press, 2008. [33] Michelle Honey, Kelley Connor, Max Veltman, David Bodily, and Scott Diener. Teaching with Second Life: Hemorrhage management as an example of a process for developing simulations for multiuser virtual environments. Clinical Simulation in Nursing, 8(3):e79 – e85, 2012. [34] Hugues Hoppe. Progressive meshes. In Proceedings of SIGGRAPH 1996, pages 99–108, New Orleans, LA, 1996. [35] Hugues Hoppe. View-dependent refinement of progressive meshes. In SIGGRAPH ’97: Proceedings of the 24th annual conference on Computer graphics and interactive techniques, pages 189–198, New York, NY, USA, 1997. [36] Shun-Yun Hu. A case for 3D streaming on peer-to-peer networks. In Proceedings of the 11th international conference on 3D web technology, pages 57–63, 2006. [37] Shun-Yun Hu, Shao-Chen Chang, and Jehn-Ruey Jiang. Voronoi state management for peer-to-peer massively multiplayer online games. In Proceedings of NIME, pages 1134–1138, January 2008. [38] Shun-Yun Hu, Jui-Fa Chen, and Tsu-Han Chen. VON: a scalable peerto- peer network for virtual environments. IEEE Network, 20(4):22–31, July-August 2006. [39] Shun-Yun Hu, Ting-Hao Huang, Shao-Chen Chang, Wei-Lun Sung, Jehn- Ruey Jiang, and Bing-Yu Chen. FLoD: A framework for peer-to-peer 3d streaming. In Proceedings of IEEE INFOCOM 2008. The 27th Conference on Computer Communications, pages 1373–1381, April 2008. [40] Guan-Yu Huang, Shun-Yun Hu, and Jehn-Ruey Jiang. Scalable reputation management for P2P MMOGs. In Proceedings of IEEE Virtual Reality (IEEE VR) workshop Massively Multiuser Virtual Environment (MMVE), 2008. [41] IMVU. Instant messaging client. http://www.imvu.com/. [42] Yan J. Security design in online games. In Proceedings of the 19th Annual Computer Security Applications Conference, pages 286–295, 2003. [43] Chris Joslin, Igor S Pandzic, and Nadia Magnenat Thalmann. Trends in networked collaborative virtual environments. Computer Communications, 26(5):430 – 437, 2003. [44] M. Kamada. A fair dynamical game over networks. In Proceedings of the 2004 International Conference on Cyberworlds (CW’04), pages 141–146, 2004. [45] M. Kamada, K. Kurosawa, Y. Ohtaki, and S. Okamoto. A network game based on fair random numbers. IEICE Transactions on Information and Systems, 88(5):859–864, 2005. [46] Ian A. Kash, John K. Lai, Haoqi Zhang, and Aviv Zohar. Economics of bittorrent communities. In Proceedings of the 21st international conference on World Wide Web, WWW ’12, pages 221–230, New York, NY, USA, 2012. ACM. [47] J. Keller and G. Simon. Solipsis: A massively multi-participant virtual world. In Proceedings of PDPTA, pages 262–268, 2003. [48] A. Kirmse and C. Kirmse. Security in online games. Game Developer, 4(4):20–8, 1997. [49] Bjorn Knutsson, Honghui Lu, Wei Xu, and Bryan Hopkins. Peer-to-peer support for massively multiplayer games. In Proceedings of IEEE IMFOCOM, 2004. [50] L. Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770–772, 1981. [51] J. Lee, H. Lee, S. Ihm, T. Gim, and J. Song. Apolo: Ad-hoc peer-to-peer overlay network for massively multi-player online games. Technical report, KAIST Technical Report, CS-TR-2005-248, December 2005. [52] Zhitang Li, Weidong Wang, Yejiang Zhang, and Weiming Li. Source authentication of media streaming based on chains of iso-hash clusters. In Proceedings of the Third international conference on Autonomic and Trusted Computing, ATC’06, pages 398–407, Berlin, Heidelberg, 2006. Springer- Verlag. [53] Nien-Shien Lin, Ting-Hao Huang, and Bing-Yu Chen. 3D model streaming based on jpeg 2000. IEEE TCE, 53(1), 2007. [54] Virginia Lo, Dayi Zhou, Yuhong Liu, Chris GauthierDickey, , and Jun Li. Scalable supernode selection in peer-to-peer overlay networks. In Proceedings HOT-P2P, 2005. [55] T. Miyoshi, Y. Shinozaki, and O. Fourmaux. A P2P traffic localization method with additional delay insertion. In Proceedings of the 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS), pages 148–154, 2012. [56] P. Morillo, W. Moncho, J.M. Ordu na, and J. Duato. Providing Full Awareness to Distributed Virtual Environments Based on Peer-To-Peer Architectures. Springer Berlin / Heidelberg, June 2006. [57] L. O’Gorman. Comparing passwords, tokens, and biometrics for user authentication. In Proceedings of the IEEE, volume 91, pages 2012–2040, December 2003. [58] Mark Pauly, Markus Gross, and Leif P. Kobbelt. Efficient simplification of point-sampled surfaces. In Proceedings of the IEEE Visualization, pages 163–170, 2002. [59] D. Pittman and C. GauthierDickey. A measurement study of virtual populations in massively multiplayer online games. In Proceedings of the 6th ACM SIGCOMM workshop on Network and system support for games, pages 25–30, 2007. [60] David Pointcheval and Jacques Stern. Security proofs for signature schemes. Advances in Cryptology — EUROCRYPT ’96, 1070/1996:387– 398, 1996. [61] B. Preneel, B. Van Rompay, S. Ors, A. Biryukov, L. Granboulan, E. Dottax, M. Dichtl, M. Schafheutle, P. Serf, and S. Pyka. Performance of optimized implementations of the NESSIE primitives, 2003. http://www.cosic.esat.kuleuven.ac.be/nessie/deliverables/. [62] Michael O. Rabin. Digitalized signatures and public-key functions as intractable as factorization. MIT/LCS/TR-212, MIT Laboratory for Computer Science, 1979. [63] K.A. Redmill, J.I. Martin, and U. Ozgliner. Virtual environment simulation for image processing sensor evaluation. In Proceedings of Intelligent Transportation Systems, pages 64–70, 2000. [64] Linden Research. Second life. http://secondlife.com/. [65] Christian Rey and Jean-Luc Dugelay. A survey of watermarking algorithms for image authentication. EURASIP Journal on Advances in Signal Processing, 2002(1):613–621, January 2002. [66] Philip Rosedale and Cory Ondrejka. Enabling player-created online worlds with grid computing and streaming. Gamasutra Resource Guide, 2003. [67] Bruce Schneier. Applied Cryptography, chapter 7. John Wiley & Sons, 2 edition, 1996. [68] Sandeep Singhal and Michael Zyda. Networked Virtual Environments: Design and Implementation. ACM Press, New York, 1999. [69] Jouni Smed, Timo Kaukoranta, and Harri Hakonen. Aspects of networking in multiplayer computer games. The Electronic Library, 20(2):87–97, 2002. [70] Wei-Lun Sung, Shun-Yun Hu, and Jehn-Ruey Jiang. Selection strategies for peer-to-peer 3D streaming. In Proceedings of the 18th International Workshop on Network and Operating Systems Support for Digital Audio and Video, pages 15–20, New York, NY, USA, 2008. ACM. [71] Hao tain Wu and Yiu ming Cheung. Public authentication of 3D mesh models. In Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence, pages 940–948, 2006. [72] Eyal Teler and Dani Lischinski. Streaming of complex 3D scenes for remote walkthroughs. Computer Graphics Forum, 20(3):200–1, 2001. [73] The MIT Kerberos Team. The network authentication protocol. http: //web.mit.edu/Kerberos/. [74] VastPark. Vastpark. http://www.vastpark.com/. [75] PingWahWong. A public key watermark for image verification and authentication. In Proceedings of International Conference on Image Processing, ICIP 98, volume 1, pages 455–459, October 1998. [76] Hao-Tian Wu and Yiu-Ming Cheung. A fragile watermarking scheme for 3D meshes. In Proceedings of the 7th workshop on Multimedia and security, pages 117–124, New York, NY, USA, 2005. ACM. [77] Thomas Zink and Marcel Waldvogel. Efficient bittorrent handshake obfuscation. In Proceedings of the First Workshop on P2P and Dependability, pages 2:1–2:5, New York, NY, USA, 2012. ACM. |