Login / Signup
Analysis of the Authentication Protocols Based on Game Theory.
Xinghua Li
Lingjuan Deng
Yuan Zhang
Dan Yang
Jianfeng Ma
Published in:
CIS (2011)
Keyphrases
</>
game theory
game theoretic
multi agent systems
authentication protocol
lightweight
resource allocation
mechanism design
security analysis
nash equilibria