Abstract—A fundamental aspect of many multiplayer online games is the ability to trade items between players. This might take the form of items that were found in the virtual environment or of purchased assets, but in either case, any multiplayer game that supports trading or exchanging items in the game must do so in a secure manner. We have developed a protocol to solve the problem of secure, peer-to-peer trading in games in which the primary concern is that items are exchanged fairly, and additionally that items are not duplicated. Our protocol enables one-way and two-way trades and can be extended to multi-item trades. We show that our protocol addresses the security threats which it might encounter, and then provide an analysis to demo...
In this paper, an investigation is conducted on the security issues in massive multiplayer games. A ...
Although much of the research into massively multiplayer online games (MMOGs) focuses on scalability...
In this paper we examine composability properties for the fundamental task of key exchange. Roughly ...
Video gaming has always been a blooming industry. With the emergence of online multi- player video g...
Abstract In trading card games (TCGs), players create a deck of cards from a subset of all cards in ...
Abstract. With more and more online game players having access to broadband Internet connections and...
The article considers the design of P2P games without trusted, centralized resources. On a case stud...
International audienceIn peer-to-peer games, cheaters can easily disrupt the game state computation ...
Abstract—Area of interests (AOI) filter plays a vital role in re-ducing the network traffic in peer-...
Massively Multiplayer Online Games have become a popular leisure activ ity and big business. They ha...
The increasing popularity of Massively Multiplayer Online Games (MMOG) – games involving thousands ...
Abstract—We explore exploits possible for cheating in real-time, multiplayer games for both client-s...
Electronic commerce and the internet provide greater opportunities for companies and individual pers...
Blockchains can be used to build multi-player online games and virtual worlds that require no centra...
Abstract—P2P-based massive multi-player online games (MMOGs) use information dissemination overlays ...
In this paper, an investigation is conducted on the security issues in massive multiplayer games. A ...
Although much of the research into massively multiplayer online games (MMOGs) focuses on scalability...
In this paper we examine composability properties for the fundamental task of key exchange. Roughly ...
Video gaming has always been a blooming industry. With the emergence of online multi- player video g...
Abstract In trading card games (TCGs), players create a deck of cards from a subset of all cards in ...
Abstract. With more and more online game players having access to broadband Internet connections and...
The article considers the design of P2P games without trusted, centralized resources. On a case stud...
International audienceIn peer-to-peer games, cheaters can easily disrupt the game state computation ...
Abstract—Area of interests (AOI) filter plays a vital role in re-ducing the network traffic in peer-...
Massively Multiplayer Online Games have become a popular leisure activ ity and big business. They ha...
The increasing popularity of Massively Multiplayer Online Games (MMOG) – games involving thousands ...
Abstract—We explore exploits possible for cheating in real-time, multiplayer games for both client-s...
Electronic commerce and the internet provide greater opportunities for companies and individual pers...
Blockchains can be used to build multi-player online games and virtual worlds that require no centra...
Abstract—P2P-based massive multi-player online games (MMOGs) use information dissemination overlays ...
In this paper, an investigation is conducted on the security issues in massive multiplayer games. A ...
Although much of the research into massively multiplayer online games (MMOGs) focuses on scalability...
In this paper we examine composability properties for the fundamental task of key exchange. Roughly ...