Game theory meets network security and privacy
DOI10.1145/2480741.2480742zbMath1293.91042OpenAlexW2067064328WikidataQ62783252 ScholiaQ62783252MaRDI QIDQ2875114
Quanyan Zhu, Tamer Bacşar, Mohammad Hossein Manshaei, Jean-Pierre Hubaux, Tansu Alpcan
Publication date: 13 August 2014
Published in: ACM Computing Surveys (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/2480741.2480742
game theorycryptographyintrusion detection systemrevocationmultiparty computationwireless securitylocation privacynetwork security and privacy
Network design and communication in computer systems (68M10) Applications of game theory (91A80) Cryptography (94A60) Research exposition (monographs, survey articles) pertaining to computer science (68-02)
Related Items (40)
This page was built for publication: Game theory meets network security and privacy