Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cyber Security Protection for Online Gaming Applications

Cyber Security Protection for Online Gaming Applications
View Sample PDF
Author(s): Wenbing Zhao (Cleveland State University, USA)
Copyright: 2018
Pages: 9
Source title: Encyclopedia of Information Science and Technology, Fourth Edition
Source Author(s)/Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-5225-2255-3.ch143


View Cyber Security Protection for Online Gaming Applications on the publisher's website for pricing and purchasing information.


In this article, we point out the threats to online gaming applications and present two strategies that can be used to build secure and dependable online gaming applications. These strategies not only seek the solution for gathering entropy to seed the PRNG used in such applications, but also intend to eliminate malicious intrusions to protect the seed and to maintain replica consistency. By applying these techniques, the online gaming applications can ensure its service integrity (both the service providers and the innocent players are protected) and guarantee high availability despite the presence of Byzantine faults. Finally, we outline some open research issues in this field.

Related Content

Yair Wiseman. © 2021. 11 pages.
Mário Pereira Véstias. © 2021. 15 pages.
Mahfuzulhoq Chowdhury, Martin Maier. © 2021. 15 pages.
Gen'ichi Yasuda. © 2021. 12 pages.
Alba J. Jerónimo, María P. Barrera, Manuel F. Caro, Adán A. Gómez. © 2021. 19 pages.
Gregor Donaj, Mirjam Sepesy Maučec. © 2021. 14 pages.
Udit Singhania, B. K. Tripathy. © 2021. 11 pages.
Body Bottom