Rational analysis of authentication protocols based on NGUYEN L H scheme

Using the ideas of game theory,NGUYEN L H transformed two families of authentication protocols where the honest party transmitted some useless data with probability α before the normal protocol run,so that even if an attacker attacks a protocol,the attacker’s payoff will still be lower than that whe...

Full description

Saved in:
Bibliographic Details
Main Authors: Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2013-08-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.08.003/
Tags: Add Tag
No Tags, Be the first to tag this record!