Rational authentication protocols
We use ideas from game theory to transform two families of authentication protocols so that even an intruder attacks a protocol, its payoff will still be lower than when it does not. This is particularly useful in resisting or discouraging a powerful and rational intruder (as present in military app...
Main Author: | |
---|---|
Format: | Journal article |
Published: |
2011
|