References

  1. T. Ågotnes, W. van der Hoek & M. Wooldridge (2010): Robust normative systems and a logic of norm compliance. Logic Journal of the IGPL 18(1), pp. 4–30, doi:10.1093/jigpal/jzp070.
  2. G. Asharov, R. Canetti & C. Hazay (2011): Towards a Game Theoretic View of Secure Computation. In: Proceedings of EUROCRYPT, pp. 426–445, doi:10.1007/978-3-642-20465-4_24.
  3. N. Asokan, V. Shoup & M. Waidner (1998): Asynchronous protocols for optimistic fair exchange. In: Proceedings of the IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, pp. 86–99, doi:10.1109/SECPRI.1998.674826.
  4. L. Buttyán, J. Hubaux & S. Čapkun (2004): A formal model of rational exchange and its application to the analysis of Syverson's protocol. Journal of Computer Security 12(3,4), pp. 551–587.
  5. K. Chatterjee & V. Raman (2010): Assume-Guarantee Synthesis for Digital Contract Signing. CoRR abs/1004.2697.
  6. Y. Dodis & T. Rabin (2007): Cryptography and Game Theory. In: Algorithmic Game Theory, chapter 8, pp. 181–208, doi:10.1017/CBO9780511800481.010.
  7. G. Fuchsbauer, J. Katz & D. Naccache (2010): Efficient Rational Secret Sharing in Standard Communication Networks. In: Proceedings of TCC, pp. 419–436, doi:10.1007/978-3-642-11799-2_25.
  8. A. Groce & J. Katz (2012): Fair Computation with Rational Players. In: Proceedings of EUROCRYPT, pp. 81–98, doi:10.1007/978-3-642-29011-4_7.
  9. W. Jamroga, M. Melissen & H. Schnoor (2013): Defendable Security in Interaction Protocols. In: Proceedings of the 16th International Conference on Principles and Practice of Multi-Agent Systems PRIMA 2013, LNCS 8291. Springer, pp. 132–148, doi:10.1007/978-3-642-44927-7_10.
  10. S. Kremer & J. Raskin (2002): Game Analysis of Abuse-Free Contract Signing. In: Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW'02). IEEE Computer Society Press, pp. 206–220, doi:10.1109/CSFW.2002.1021817.
  11. S. Kremer & J.-F. Raskin (2003): A game-based verification of non-repudiation and fair exchange protocols. Journal of Computer Security 11(3), doi:10.1007/3-540-44685-0_37.
  12. T. Moore & R. Anderson (2011): Economics and Internet Security: a Survey of Recent Analytical, Empirical and Behavioral Research. Technical Report TR-03-11. Computer Science Group, Harvard University.
  13. M. Osborne & A. Rubinstein (1994): A Course in Game Theory. MIT Press.
  14. P. Syverson (1998): Weakly Secret Bit Commitment: Applications to Lotteries and Fair Exchange. In: Proceedings of CSFW, pp. 2–13, doi:10.1109/CSFW.1998.683149.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org