參考文獻 |
[1] ANSI/IEEE Standard 754-1985. Standard for binary floating point arithmetic.
[2] Jacob R. Lorch Thomas Moscibroda Jeffrey Pang Srinivasan Seshan Ashwin
Bharambe, John R. Douceur and Xinyu Zhuang. Donnybrook: Enabling
large-scale, high-speed, peer-to-peer games. In Proceedings of SIGCOMM,
2008.
[3] N.E. Baughman and B.N. Levine. Cheat-proof playout for centralized and
distributed online games. In Proceedings of INFOCOM, volume 1, pages
104–113, 2001.
[4] M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange
secure against dictionary attacks. Eurocrypt 2000 (LNCS 1807), pages
139–155, 2000.
[5] M. Bellare and P. Rogaway. Optimal asymmetric encryption. Eurocrypt’94,
pages 92–111, 1994.
[6] Francesco Bergadano, Davide Cavagnino, and Bruno Crispo. Chained
stream authentication. In Proceedings of the 7th Annual International
Workshop on Selected Areas in Cryptography, volume 2012 of Lecture Notes
In Computer Science, pages 144–157. Springer-Verlag, 2000.
[7] Ashwin Bharambe, Jeffery Pang, and Srinivasan Seshan. Colyseus: a distributed
architecture for online multiplayer games. In Proceedings of the
3rd conference on 3rd Symposium on Networked Systems Design & Implementation,
volume 3, pages 12–12, San Jose, CA, 2006.
[8] Jean Botev, Alexander Hohfeld, Hermann Schloss, Ingo Scholtes, Peter
Sturm, and Markus Esch. The HyperVerse: concepts for a federated and
torrent-based ’3D web’. International Journal of Advanced Media and
Communication, 2(4):331–350, 2008.
[9] David M. Burton. Elementary Number Theory, 6th Edition. ACM Press,
2005.
[10] Romain Cavagna, Christian Bouville, and Jerome Royan. P2P network
for very large virtual environment. In Proceedings of the ACM symposium
on Virtual reality software and technology, pages 269–276, New York, NY,
USA, 2006. ACM.
[11] Mo-Che Chan, Shun-Yun Hu, and Jehn-Ruey Jiang. An efficient and secure
event signature (EASES) protocol for peer-to-peer massively multiplayer
online games. Compututer Networks, 52(9):1838–1845, 2008.
[12] Mo-Che Chan, Shun-Yun Hu, and Jehn-Ruey Jiang. Secure peer-to-peer 3D
streaming. Multimedia Tools and Applications, 45(1-3):369–384, October
2009.
[13] Mo-Che Chan, Jehn-Ruey Jiang, Chao-Wei Hung, and Wei Tsang Ooi.
Group-based peer-to-peer 3D streaming authentication. In Proceedings of
the 15th International Conference on Parallel and Distributed Systems (ICPADS),
pages 685 –691, December 2009.
[14] Chien-nan Chen, Cing-yu Chu, Su-ling Yeh, Hao-hua Chu, and Polly
Huang. Measuring the perceptual quality of skype sources. SIGCOMM
Computer Communication Review, 42(4):521–526, September 2012.
[15] Kuan-Ta Chen, Polly Huang, and Chin-Laung Lei. Game traffic analysis:
An MMORPG perspective. Computer Networks, 50(16):3002–3023,
November 2006.
[16] Wei Cheng and Wei Tsang Ooi. Receiver-driven view-dependent streaming
of progressive mesh. In Proceedings of NOSSDAV, 2008.
[17] Wei Cheng, Wei Tsang Ooi, Sebastien Mondet, Romulus Grigoras, and
Géraldine Morin. An analytical model for progressive mesh streaming.
In Proceedings of the ACM Multimedia 2007, pages 737–746, Augsburg,
Germany, September 2007.
[18] Daniel Cohen, Nick Sevdalis, David Taylor, Karen Kerr, Mick Heys, Keith
Willett, Nicola Batrick, and Ara Darzi. Emergency preparedness in the
21st century: Training and preparation modules in virtual environments.
Resuscitation, 84(1):78 – 84, 2013.
[19] A.B. Corman, S. Douglas, P. Schachte, and V. Teague. A secure event
agreement (SEA) protocol for peer-to-peer games. In Proceedings of the 1st
International Conference on Availability, Reliability and Security, 2006.
[20] E. Cronin, B. Filstrup, and S. Jamin. Cheat-proofing dead reckoned multiplayer
games. In Proceedings of Application and Development of Computer
Games, 2003.
[21] Wei Dai. Crypto++ benchmarks. http://www.cryptopp.com/
benchmarks.html.
[22] Wei Dai. Crypto++ library. http://www.cryptopp.com.
[23] C.G. Dickey, D. Zappala, V. Lo, and J. Marr. Low latency and cheat-proof
event ordering for peer-to-peer games. In Proceedings of ACM International
Workshop on Network and Operating System Support for Digital Audio and
Video (NOSSDAV), Kinsale, County Cork, Ireland, pages 134–139, 2004.
[24] C. Diot and L. Gautier. A distributed architecture for multiplayer interactive
application on the internet. In IEEE Networks, volume 13, July
1999.
[25] Scott Douglas, Egemen Tanin, Aaron Harwood, and Shanika Karunasekera.
Enabling massively multi-player online gaming applications on a P2P
architecture. In Proceedings of the IEEE International Conference on Information
and Automation, pages 7–12, December 2005.
[26] Blizzard Entertainment. World of warcraft. http://us.battle.net/wow/
en/.
[27] Davide Frey, Jérôme Royan, Romain Piegay, Anne marie Kermarrec, Fabrice
Le Fessant, and Emmanuelle Anceaume. Solipsis: A decentralized
architecture for virtual environments. In Proceedings of the 1st International
Workshop on Massively Multiuser Virtual Environments (MMVE),
2008.
[28] C. GauthierDickey, V. Lo, and D. Zappala. Using n-trees for scalable
event ordering in peer-to-peer games. In Proceedings of the international
workshop on Network and operating systems support for digital audio and
video, pages 87–92. ACM Press New York, NY, USA, 2005.
[29] Laurent Gautier, Christophe Diot, and Jim Kurose. End-to-end transmission
control mechanisms for multiparty interactive applications on the
internet. In Proceedings of IEEE INFOCOM, 1999.
[30] Rosario Gennaro and Pankaj Rohatgi. How to sign digital streams. In
Proceedings of the 17th Annual International Cryptology Conference on
Advances in Cryptology, Lecture Notes In Computer Science 1294, pages
180 – 197, 1997.
[31] Yan Gu and Wei Tsang Ooi. Packetization of 3D progressive meshes for
streaming over lossy networks. In Proceedings of the 14th International
Conference on Computer Communications and Networks (ICCCN), San
Diego, CA, October 2005.
[32] Satyandra K. Gupta, Davinder K. Anand, John E. Brough, Maxim
Schwartz, and Robert A. Kavetsky. Training in Virtual Environments:
A Safe, Cost-Effective, and Engaging Approach to Training. EPSC Press,
2008.
[33] Michelle Honey, Kelley Connor, Max Veltman, David Bodily, and Scott Diener.
Teaching with Second Life: Hemorrhage management as an example
of a process for developing simulations for multiuser virtual environments.
Clinical Simulation in Nursing, 8(3):e79 – e85, 2012.
[34] Hugues Hoppe. Progressive meshes. In Proceedings of SIGGRAPH 1996,
pages 99–108, New Orleans, LA, 1996.
[35] Hugues Hoppe. View-dependent refinement of progressive meshes. In
SIGGRAPH ’97: Proceedings of the 24th annual conference on Computer
graphics and interactive techniques, pages 189–198, New York, NY, USA,
1997.
[36] Shun-Yun Hu. A case for 3D streaming on peer-to-peer networks. In
Proceedings of the 11th international conference on 3D web technology,
pages 57–63, 2006.
[37] Shun-Yun Hu, Shao-Chen Chang, and Jehn-Ruey Jiang. Voronoi state
management for peer-to-peer massively multiplayer online games. In Proceedings
of NIME, pages 1134–1138, January 2008.
[38] Shun-Yun Hu, Jui-Fa Chen, and Tsu-Han Chen. VON: a scalable peerto-
peer network for virtual environments. IEEE Network, 20(4):22–31,
July-August 2006.
[39] Shun-Yun Hu, Ting-Hao Huang, Shao-Chen Chang, Wei-Lun Sung, Jehn-
Ruey Jiang, and Bing-Yu Chen. FLoD: A framework for peer-to-peer 3d
streaming. In Proceedings of IEEE INFOCOM 2008. The 27th Conference
on Computer Communications, pages 1373–1381, April 2008.
[40] Guan-Yu Huang, Shun-Yun Hu, and Jehn-Ruey Jiang. Scalable reputation
management for P2P MMOGs. In Proceedings of IEEE Virtual Reality
(IEEE VR) workshop Massively Multiuser Virtual Environment (MMVE),
2008.
[41] IMVU. Instant messaging client. http://www.imvu.com/.
[42] Yan J. Security design in online games. In Proceedings of the 19th Annual
Computer Security Applications Conference, pages 286–295, 2003.
[43] Chris Joslin, Igor S Pandzic, and Nadia Magnenat Thalmann. Trends in
networked collaborative virtual environments. Computer Communications,
26(5):430 – 437, 2003.
[44] M. Kamada. A fair dynamical game over networks. In Proceedings of the
2004 International Conference on Cyberworlds (CW’04), pages 141–146,
2004.
[45] M. Kamada, K. Kurosawa, Y. Ohtaki, and S. Okamoto. A network game
based on fair random numbers. IEICE Transactions on Information and
Systems, 88(5):859–864, 2005.
[46] Ian A. Kash, John K. Lai, Haoqi Zhang, and Aviv Zohar. Economics of
bittorrent communities. In Proceedings of the 21st international conference
on World Wide Web, WWW ’12, pages 221–230, New York, NY, USA,
2012. ACM.
[47] J. Keller and G. Simon. Solipsis: A massively multi-participant virtual
world. In Proceedings of PDPTA, pages 262–268, 2003.
[48] A. Kirmse and C. Kirmse. Security in online games. Game Developer,
4(4):20–8, 1997.
[49] Bjorn Knutsson, Honghui Lu, Wei Xu, and Bryan Hopkins. Peer-to-peer
support for massively multiplayer games. In Proceedings of IEEE IMFOCOM,
2004.
[50] L. Lamport. Password authentication with insecure communication. Communications
of the ACM, 24(11):770–772, 1981.
[51] J. Lee, H. Lee, S. Ihm, T. Gim, and J. Song. Apolo: Ad-hoc peer-to-peer
overlay network for massively multi-player online games. Technical report,
KAIST Technical Report, CS-TR-2005-248, December 2005.
[52] Zhitang Li, Weidong Wang, Yejiang Zhang, and Weiming Li. Source authentication
of media streaming based on chains of iso-hash clusters. In Proceedings
of the Third international conference on Autonomic and Trusted
Computing, ATC’06, pages 398–407, Berlin, Heidelberg, 2006. Springer-
Verlag.
[53] Nien-Shien Lin, Ting-Hao Huang, and Bing-Yu Chen. 3D model streaming
based on jpeg 2000. IEEE TCE, 53(1), 2007.
[54] Virginia Lo, Dayi Zhou, Yuhong Liu, Chris GauthierDickey, , and Jun Li.
Scalable supernode selection in peer-to-peer overlay networks. In Proceedings
HOT-P2P, 2005.
[55] T. Miyoshi, Y. Shinozaki, and O. Fourmaux. A P2P traffic localization
method with additional delay insertion. In Proceedings of the 4th International
Conference on Intelligent Networking and Collaborative Systems
(INCoS), pages 148–154, 2012.
[56] P. Morillo, W. Moncho, J.M. Ordu na, and J. Duato. Providing Full Awareness
to Distributed Virtual Environments Based on Peer-To-Peer Architectures.
Springer Berlin / Heidelberg, June 2006.
[57] L. O’Gorman. Comparing passwords, tokens, and biometrics for user authentication.
In Proceedings of the IEEE, volume 91, pages 2012–2040,
December 2003.
[58] Mark Pauly, Markus Gross, and Leif P. Kobbelt. Efficient simplification of
point-sampled surfaces. In Proceedings of the IEEE Visualization, pages
163–170, 2002.
[59] D. Pittman and C. GauthierDickey. A measurement study of virtual populations
in massively multiplayer online games. In Proceedings of the 6th
ACM SIGCOMM workshop on Network and system support for games,
pages 25–30, 2007.
[60] David Pointcheval and Jacques Stern. Security proofs for signature
schemes. Advances in Cryptology — EUROCRYPT ’96, 1070/1996:387–
398, 1996.
[61] B. Preneel, B. Van Rompay, S. Ors, A. Biryukov, L. Granboulan,
E. Dottax, M. Dichtl, M. Schafheutle, P. Serf, and S. Pyka. Performance
of optimized implementations of the NESSIE primitives, 2003.
http://www.cosic.esat.kuleuven.ac.be/nessie/deliverables/.
[62] Michael O. Rabin. Digitalized signatures and public-key functions as intractable
as factorization. MIT/LCS/TR-212, MIT Laboratory for Computer
Science, 1979.
[63] K.A. Redmill, J.I. Martin, and U. Ozgliner. Virtual environment simulation
for image processing sensor evaluation. In Proceedings of Intelligent
Transportation Systems, pages 64–70, 2000.
[64] Linden Research. Second life. http://secondlife.com/.
[65] Christian Rey and Jean-Luc Dugelay. A survey of watermarking algorithms
for image authentication. EURASIP Journal on Advances in Signal Processing,
2002(1):613–621, January 2002.
[66] Philip Rosedale and Cory Ondrejka. Enabling player-created online worlds
with grid computing and streaming. Gamasutra Resource Guide, 2003.
[67] Bruce Schneier. Applied Cryptography, chapter 7. John Wiley & Sons, 2
edition, 1996.
[68] Sandeep Singhal and Michael Zyda. Networked Virtual Environments: Design
and Implementation. ACM Press, New York, 1999.
[69] Jouni Smed, Timo Kaukoranta, and Harri Hakonen. Aspects of networking
in multiplayer computer games. The Electronic Library, 20(2):87–97, 2002.
[70] Wei-Lun Sung, Shun-Yun Hu, and Jehn-Ruey Jiang. Selection strategies
for peer-to-peer 3D streaming. In Proceedings of the 18th International
Workshop on Network and Operating Systems Support for Digital Audio
and Video, pages 15–20, New York, NY, USA, 2008. ACM.
[71] Hao tain Wu and Yiu ming Cheung. Public authentication of 3D mesh
models. In Proceedings of the IEEE/WIC/ACM International Conference
on Web Intelligence, pages 940–948, 2006.
[72] Eyal Teler and Dani Lischinski. Streaming of complex 3D scenes for remote
walkthroughs. Computer Graphics Forum, 20(3):200–1, 2001.
[73] The MIT Kerberos Team. The network authentication protocol. http:
//web.mit.edu/Kerberos/.
[74] VastPark. Vastpark. http://www.vastpark.com/.
[75] PingWahWong. A public key watermark for image verification and authentication.
In Proceedings of International Conference on Image Processing,
ICIP 98, volume 1, pages 455–459, October 1998.
[76] Hao-Tian Wu and Yiu-Ming Cheung. A fragile watermarking scheme for
3D meshes. In Proceedings of the 7th workshop on Multimedia and security,
pages 117–124, New York, NY, USA, 2005. ACM.
[77] Thomas Zink and Marcel Waldvogel. Efficient bittorrent handshake obfuscation.
In Proceedings of the First Workshop on P2P and Dependability,
pages 2:1–2:5, New York, NY, USA, 2012. ACM. |