[1] |
ALPCAN T , BASAR T . Network Security:A Decision and Game Theoretic Approach[M]. Cambridge: Cambridge University Press, 2011.
|
[2] |
GILLAT K , MONI N . Cryptography and game theory:designing protocols for exchanging information[A]. Proceedings of Theory of Cryptography Conference 2008[C]. New York,USA, 2008. 320-339.
|
[3] |
HALPERN J Y , PASS R . Game theory with costly computation:formulation and application to protocol security[A]. Proceedings of Innovations in Computer Science2010[C]. Beijing,China, 2010. 120-142.
|
[4] |
MANSHAEI M H , ZHU Q , ALPCAN T . Game Theory Meets Network Security and Privacy[R]. EPFL Report, 2010.
|
[5] |
ROY S , ELLIS C , SHIVA S ,et al. A survey of game theory as applied to network security[A]. Proceedings of HICSS[C]. Koloa Kauai,USA, 2010. 1-10.
|
[6] |
SUN W , KONG X , HE D ,et al. Information security problem research based on game theory[A]. Proceedings of ISECS[C]. Guangzhou,China, 2008. 554-557.
|
[7] |
GORDON S D , KATZ J . Rational secret sharing,revisited[A]. Proceedings of Security and Cryptography for Networks Lecture Notes in Computer Science[C]. Maiori,Italy, 2006.4116: 229-241.
|
[8] |
FUCHSBAUER G , KATZ J , NACCACHE D . Effcient rational secret sharing in standard communication networks[A]. Proceedings of TCC 2010[C]. RJ,USA, 2010. 419-436.
|
[9] |
OMRANI A , FALLAH M S . A game-theoretic cooperation stimulus routing protocol in MANETs[J]. IAENG International Journal of Computer Science, 2008,35(1): 174-181.
|
[10] |
PAVLIDOU F N , KOLTSIDAS G . Game theory for routing modeling in communication networks-a survey[J]. Journal of Communications and Networks, 2008,10(3): 268-286.
|
[11] |
EL N , SYRINE K , FOUAD K ,et al. WSEAS:a bidirectional bluetooth authentication scheme based on game-theoretic framework,alfred menezes[J]. WSEAS Transactions on Communications, 2006,15(6): 1219-1227.
|
[12] |
ALMUDENA A , PALOMAR E , RIBAGORDA A ,et al. Formal proof of cooperativeness in a multi-party P2P content authentication protocol[A]. Proceedings of TrustBus 2010[C]. Bilbao,Spain, 2010. 141-152.
|
[13] |
GORDON S D , KATZ J . Rational secret sharing,revisited[A]. Proceedings of Security and Cryptography for Networks Lecture Notes in Computer Science[C]. Maiori,Italy, 2006.4116: 229-241.
|
[14] |
NGUYEN L H . Rational authentication protocols[EB/OL]. , 2011.
|
[15] |
CANETTI R , KRAWCZYK H . Analysis of key-exchange protocols and their use for building secure channels[A]. Proceedings of Eurocrypt 2001,Lecture Notes in Computer Science[C]. Innsbruck,Austria, 2001. 453-474.
|
[16] |
CANETTI R , KRAWCZYK H . Universally composable notions of key exchange and secure channel[A]. Proceedings of Eurocrypt 2002,Lecture Notes in Computer Science[C]. Amsterdam,The Netherlands, 2002. 337-351.
|
[17] |
LAW L , MENEZES A , QU M ,et al. An efficient protocol for authenticated key agreement[J]. Designs,Codes and Cryptography, 2003,28(2): 119-134.
|
[18] |
MENEZES A . Another look at HMQV[J]. Journal of Mathematical Cryptology, 2007,1(1): 47-64.
|
[19] |
KRAWCZYK H . HMQV:a high-performance secure diffie-hellman protocol[J]. Lecture Notes in Computer Science, 2005,3621: 546-566.
|
[20] |
BELLOVIN S M , MERRITT M . Encrypted key exchange:password-based protocols secure against dictionary attacks[A]. Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland)[C]. Oakland,California,USA, 1992. 72-84.
|
[21] |
BOYKO V , MACKENZIE P , PATEL S . Provably secure password-authenticated key exchange using diffie-hellman[A]. Advances in Cryptology-Eurocrypt 2000,Lecture Notes in Computer Science[C]. Bruges,Belgium, 2000.1807: 156-171.
|