Abstract. We present a systematic study of Plurality elections with strategic voters who, in addition to having preferences over election winners, also have secondary preferences, ...
In the traditional setting of routing games, the standard assumption is that selfish agents are unconcerned with the performance of their competitors in the network. We propose an...
Revealed preference techniques are used to test whether a data set is compatible with rational behaviour. They are also incorporated as constraints in mechanism design to encourage...
Fresh re-keying is a type of protocol which aims at splitting the task of protecting an encryption/authentication scheme against side-channel attacks in two parts. One part, a re-k...
Abstract. Rank estimation is an important tool for side-channel evaluations laboratories. It allows determining the remaining security after an attack has been performed, quantifi...
Abstract. A formalization of a logical subset of Goal Structuring Notation (GSN) arguments is presented. The aim is to reveal the conditions which must be true in order to guarante...
Abstract. Incremental design is an essential part of engineering. Without it, engineering would not likely be an economic, nor an effective, aid to economic progress. Further, eng...
The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many s...
Florian Arnold, Dennis Guck, Rajesh Kumar, Mari&eu...