T. Ågotnes, W. van der Hoek & M. Wooldridge (2010):
Robust normative systems and a logic of norm compliance.
Logic Journal of the IGPL 18(1),
pp. 4–30,
doi:10.1093/jigpal/jzp070.
G. Asharov, R. Canetti & C. Hazay (2011):
Towards a Game Theoretic View of Secure Computation.
In: Proceedings of EUROCRYPT,
pp. 426–445,
doi:10.1007/978-3-642-20465-4_24.
N. Asokan, V. Shoup & M. Waidner (1998):
Asynchronous protocols for optimistic fair exchange.
In: Proceedings of the IEEE Symposium on Research in Security and Privacy.
IEEE Computer Society Press,
pp. 86–99,
doi:10.1109/SECPRI.1998.674826.
L. Buttyán, J. Hubaux & S. Čapkun (2004):
A formal model of rational exchange and its application to the analysis of Syverson's protocol.
Journal of Computer Security 12(3,4),
pp. 551–587.
K. Chatterjee & V. Raman (2010):
Assume-Guarantee Synthesis for Digital Contract Signing.
CoRR abs/1004.2697.
Y. Dodis & T. Rabin (2007):
Cryptography and Game Theory.
In: Algorithmic Game Theory, chapter 8,
pp. 181–208,
doi:10.1017/CBO9780511800481.010.
G. Fuchsbauer, J. Katz & D. Naccache (2010):
Efficient Rational Secret Sharing in Standard Communication Networks.
In: Proceedings of TCC,
pp. 419–436,
doi:10.1007/978-3-642-11799-2_25.
A. Groce & J. Katz (2012):
Fair Computation with Rational Players.
In: Proceedings of EUROCRYPT,
pp. 81–98,
doi:10.1007/978-3-642-29011-4_7.
W. Jamroga, M. Melissen & H. Schnoor (2013):
Defendable Security in Interaction Protocols.
In: Proceedings of the 16th International Conference on Principles and Practice of Multi-Agent Systems PRIMA 2013,
LNCS 8291.
Springer,
pp. 132–148,
doi:10.1007/978-3-642-44927-7_10.
S. Kremer & J. Raskin (2002):
Game Analysis of Abuse-Free Contract Signing.
In: Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW'02).
IEEE Computer Society Press,
pp. 206–220,
doi:10.1109/CSFW.2002.1021817.
S. Kremer & J.-F. Raskin (2003):
A game-based verification of non-repudiation and fair exchange protocols.
Journal of Computer Security 11(3),
doi:10.1007/3-540-44685-0_37.
T. Moore & R. Anderson (2011):
Economics and Internet Security: a Survey of Recent Analytical, Empirical and Behavioral Research.
Technical Report TR-03-11.
Computer Science Group, Harvard University.
M. Osborne & A. Rubinstein (1994):
A Course in Game Theory.
MIT Press.
P. Syverson (1998):
Weakly Secret Bit Commitment: Applications to Lotteries and Fair Exchange.
In: Proceedings of CSFW,
pp. 2–13,
doi:10.1109/CSFW.1998.683149.