Secure Message Delivery Games for Device-to-Device Communications
DOI10.1007/978-3-319-12601-2_11zbMATH Open1453.91014OpenAlexW84261718MaRDI QIDQ2818059FDOQ2818059
Authors: Emmanouil Panaousis, Hossein Fereidooni, M. Conti, Tansu Alpcan
Publication date: 5 September 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://research.brighton.ac.uk/en/publications/0ccedf74-bf4b-470f-92bc-0078d346e45c
Recommendations
- scientific article; zbMATH DE number 3856985
- Secure communications based on sending-or-not-sending strategy
- Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary
- Secure message transmission in asynchronous networks
- Perfectly reliable and secure message transmission tolerating mobile adversary
- Approaching secure communications in a message-oriented mobile computing environment
- Secure message transmission on directed networks
- Game-theoretic security for bit commitment
- On Proactive Perfectly Secure Message Transmission
- Secure Message Transmission in Asynchronous Directed Graphs
Applications of game theory (91A80) Noncooperative games (91A10) Network design and communication in computer systems (68M10)
Cited In (2)
This page was built for publication: Secure Message Delivery Games for Device-to-Device Communications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2818059)