Sciweavers

1059 search results - page 120 / 212
» Modeling Security Protocols as Games
Sort
View
121
Voted
ICC
2007
IEEE
158views Communications» more  ICC 2007»
15 years 7 months ago
Cooperative Game Theory for Distributed Spectrum Sharing
— There is a need for new spectrum access protocols that are opportunistic, flexible and efficient, yet fair. Game theory provides a framework for analyzing spectrum access, a ...
Juan E. Suris, Luiz A. DaSilva, Zhu Han, Allen B. ...
ACSD
2003
IEEE
103views Hardware» more  ACSD 2003»
15 years 5 months ago
Design Validation of ZCSP with SPIN
— We consider the problem of specifying a model of the Zero Copy Secured Protocol for the purpose of LTL verification with the SPIN Model Checker. ZCSP is based on Direct Memory...
Vincent Beaudenon, Emmanuelle Encrenaz, Jean Lou D...
130
Voted
ACISP
2006
Springer
15 years 4 months ago
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. The techniques of digital signatures are generally considered a...
Shidi Xu, Yi Mu, Willy Susilo
102
Voted
EUROCRYPT
1998
Springer
15 years 4 months ago
Strengthened Security for Blind Signatures
Abstract. Provable security is a very nice property for cryptographic protocols. Unfortunately, in many cases, this is at the cost of a considerable loss in terms of efficiency. Mo...
David Pointcheval
141
Voted
INFOCOM
2012
IEEE
13 years 3 months ago
Spectrum mobility games
Cognitive radio gives users the ability to switch channels and make use of dynamic spectral opportunities. However, switching channels takes time, and may disrupt the quality of a...
Richard Southwell, Jianwei Huang, Xin Liu