2018
DOI: 10.1007/s12652-017-0669-z
|View full text |Cite
|
Sign up to set email alerts
|

Rational adversary with flexible utility in secure two-party computation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 44 publications
0
1
0
Order By: Relevance
“…Unfortunately, their work does not cover the setting of corruption costs. Wang et al (2018Wang et al ( , 2016 propose rational secure two-party computation to describe the attacking model toward the view of game theory. Adat et al (2018) propose an economic incentive-based risk transfer mechanism, which can prevent denial of service attack Adat et al (2018) in Internet of Things.…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, their work does not cover the setting of corruption costs. Wang et al (2018Wang et al ( , 2016 propose rational secure two-party computation to describe the attacking model toward the view of game theory. Adat et al (2018) propose an economic incentive-based risk transfer mechanism, which can prevent denial of service attack Adat et al (2018) in Internet of Things.…”
Section: Introductionmentioning
confidence: 99%