Login / Signup

Analysis of the Authentication Protocols Based on Game Theory.

Xinghua LiLingjuan DengYuan ZhangDan YangJianfeng Ma
Published in: CIS (2011)
Keyphrases
  • game theory
  • game theoretic
  • multi agent systems
  • authentication protocol
  • lightweight
  • resource allocation
  • mechanism design
  • security analysis
  • nash equilibria