Sciweavers

1059 search results - page 28 / 212
» Modeling Security Protocols as Games
Sort
View
EUROCRYPT
2001
Springer
14 years 1 months ago
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Abstract. We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys som...
Ran Canetti, Hugo Krawczyk
IEEEARES
2010
IEEE
14 years 3 months ago
Pitfalls in Formal Reasoning about Security Protocols
Formal verification can give more confidence in the security of cryptographic protocols. Application specific security properties like “The service provider does not loose mo...
Nina Moebius, Kurt Stenzel, Wolfgang Reif
ESAS
2006
Springer
14 years 12 days ago
Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol
We investigate the performance of of several protocol enhancements to the On-Demand Secure Byzantine Routing (ODSBR) [3] protocol in the presence of various Byzantine Attack models...
Baruch Awerbuch, Robert G. Cole, Reza Curtmola, Da...
ATAL
2009
Springer
14 years 3 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
INFOCOM
2009
IEEE
14 years 3 months ago
Interference-Aware MAC Protocol for Wireless Networks by a Game-Theoretic Approach
—We propose an interference-aware MAC protocol using a simple transmission strategy motivated by a gametheoretic approach. We formulate a channel access game, which considers nod...
HyungJune Lee, Hyukjoon Kwon, Arik Motskin, Leonid...