Sciweavers

1059 search results - page 3 / 212
» Modeling Security Protocols as Games
Sort
View
CCS
2008
ACM
13 years 7 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
CARDIS
2006
Springer
109views Hardware» more  CARDIS 2006»
13 years 9 months ago
A Smart Card-Based Mental Poker System
On-line casinos have experienced a great expansion since the generalized use of Internet started. There exist in the literature several proposals of systems allowing secure remote ...
Jordi Castellà-Roca, Josep Domingo-Ferrer, ...
CLIMA
2004
13 years 7 months ago
A Computational Model for Conversation Policies for Agent Communication
In this paper we propose a formal specification of a persuasion protocol between autonomous agents using an approach based on social commitments and arguments. In order to be flexi...
Jamal Bentahar, Bernard Moulin, John-Jules Ch. Mey...
IWSEC
2007
Springer
13 years 12 months ago
On Security Models and Compilers for Group Key Exchange Protocols
Emmanuel Bresson, Mark Manulis, Jörg Schwenk