Sciweavers

1059 search results - page 102 / 212
» Modeling Security Protocols as Games
Sort
View
90
Voted
INFOCOM
2009
IEEE
15 years 7 months ago
Analysis of Adaptive Incentive Protocols for P2P Networks
— Incentive protocols play a crucial role to encourage cooperation among nodes in networking applications. The aim of this paper is to provide a general analytical framework to a...
Ben Q. Zhao, John C. S. Lui, Dah-Ming Chiu
100
Voted
ATAL
2009
Springer
15 years 7 months ago
Dynamic protocols for open agent systems
Multi-agent systems where the members are developed by parties with competing interests, and where there is no access to a member’s internal state, are often classified as ‘o...
Alexander Artikis
106
Voted
PERCOM
2004
ACM
16 years 3 days ago
PrudentExposure: A Private and User-centric Service Discovery Protocol
: Service Discovery as an essential element in pervasive computing environments is widely accepted. Much active research on service discovery has been conducted, but privacy has be...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
EUROPKI
2006
Springer
15 years 4 months ago
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Abstract. Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper fo...
Maurizio Adriano Strangio
127
Voted
ISCI
2010
146views more  ISCI 2010»
14 years 9 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...