Online Gaming

Online Gaming

Cyber Security Protection for Online Gaming Applications, the Law and other Social Sciences

In this article, we point out the threats to online gaming applications and present two strategies that can be used to build secure and dependable online gaming applications. These strategies not only seek the solution for gathering entropy to seed the PRNG used in such applications, but also intend to eliminate malicious intrusions to protect the seed and to maintain replica consistency. By applying these techniques, the online gaming applications can ensure its service integrity (both the service providers and the innocent players are protected) and guarantee high availability despite the presence of Byzantine faults. Finally, we outline some open research issues in this field.[1]

Resources

Notes and References

  1. Wenbing Zhao, “Cyber Security Protection for Online Gaming Applications” (Encyclopedia of Information Science and Technology, 4th Edition, Information Resources Management Association, 2018)

Posted

in

,

by

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *