Risk Balance in Exchange Protocols
We study the behaviour of rational agents in exchange protocols which rely on trustees. We allow malicious parties to compromise the trustee by paying a cost and, thereby, present a game analysis that advocates exchange protocols which induce balanced ris
- PDF / 9,163,730 Bytes
- 323 Pages / 430.15 x 660.926 pts Page_size
- 48 Downloads / 184 Views
Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany
4846
Iliano Cervesato (Ed.)
Advances in Computer Science – ASIAN 2007 Computer and Network Security 12th Asian Computing Science Conference Doha, Qatar, December 9-11, 2007 Proceedings
13
Volume Editor Iliano Cervesato Carnegie Mellon University Doha, Qatar E-mail: [email protected]
Library of Congress Control Number: 2007939450 CR Subject Classification (1998): F.3, E.3, D.2.4, D.4.6-7, K.6.5, C.2 LNCS Sublibrary: SL 1 – Theoretical Computer Science and General Issues ISSN ISBN-10 ISBN-13
0302-9743 3-540-76927-7 Springer Berlin Heidelberg New York 978-3-540-76927-9 Springer Berlin Heidelberg New York
This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springer.com © Springer-Verlag Berlin Heidelberg 2007 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 12195626 06/3180 543210
Preface
The ASIAN conference series provides a forum for researchers throughout Asia to present cutting-edge results in yearly-themed areas of computer science, to discuss advances in these fields, and to promote interaction with researchers from other continents. Accordingly, the conference moves every year to a different center of research throughout Asia: previous editions were held in Tokyo, Kunming (China), Bangkok, Mumbai, Hanoi, Penang (Malaysia), Phuket (Thailand), Manila, Kathmandu, Singapore, and Pathumthani (Thailand) where ASIAN was initiated by AIT, INRIA and UNU/IIST in 1995. The 12th edition took place in Doha, Qatar, during December 9–11, 2007. Each year, the conference focuses on a different theme at the cutting edge of c
Data Loading...