Rational authentication protocols

We use ideas from game theory to transform two families of authentication protocols so that even an intruder attacks a protocol, its payoff will still be lower than when it does not. This is particularly useful in resisting or discouraging a powerful and rational intruder (as present in military app...

Full description

Bibliographic Details
Main Author: Nguyen, L
Format: Journal article
Published: 2011