Game theory meets network security and privacy
Top Cited Papers
- 1 June 2013
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Computing Surveys
- Vol. 45 (3), 1-39
- https://doi.org/10.1145/2480741.2480742
Abstract
No abstract availableKeywords
This publication has 66 references indexed in Scilit:
- The Economics of Information SecurityScience, 2006
- Economics of Information SecuritySSRN Electronic Journal, 2006
- On the Distribution and Revocation of Cryptographic Keys in Sensor NetworksIEEE Transactions on Dependable and Secure Computing, 2005
- Correlated Jamming on MIMO Gaussian Fading ChannelsIEEE Transactions on Information Theory, 2004
- A game theoretic approach to provide incentive and service differentiation in P2P networksACM SIGMETRICS Performance Evaluation Review, 2004
- Analysis of an on-off jamming situation as a dynamic gameIEEE Transactions on Communications, 2000
- The Gaussian test channel with an intelligent jammerIEEE Transactions on Information Theory, 1983
- The Gaussian wire-tap channelIEEE Transactions on Information Theory, 1978
- Broadcast channels with confidential messagesIEEE Transactions on Information Theory, 1978
- Non-Cooperative GamesAnnals of Mathematics, 1951