Computer Science ›› 2018, Vol. 45 ›› Issue (11): 115-123.doi: 10.11896/j.issn.1002-137X.2018.11.017
• Information Security • Previous Articles Next Articles
LU Zheng-fu, PU Yan-hong, NI Sheng-bin, XU Chen-ming, YANG Chun-yao
CLC Number:
[1]ASOKAN N.Fairness in electroniccommerce[D].Waterloo: University of Waterloo,1998. [2]SYVERSON P.Weakly secret bit commitment:Applications to lotteries and fair exchange[C]∥Proceedings of the 11th IEEE Computer Security Foundations Workshop.1998:2-13. [3]BUTTYÁN L,HUBAUX J P.Toward a Formal Model of Fair Exchange-a Game Theoretic Approach Technical Report SSC/1999/039[R].Epfl,1999:1-16. [4]BUTTYÁN L.Removing the financial incentive to cheat inmicro payment schemes[J].Electronics Letters,2000,36(2):132-133. [5]BUTTYÁN L,JEAN-PIERRE H.Rational Exchange-A Formal Model Based on Game Theory[M]∥Electronic Commerce.Berlin:Springer,2001:114-126. [6]BUTTYÁN L,HUBAUX J P,CˇAPKUN S.A Formal Model of Rational Exchange and Its Application to the Analysis of Syverson’s Protocol[J].Journal on Computer Security,2004,12(3-4):551-587. [7]BUTTYÁN L,HUBAUX J P,CAPKUN S.A Formal Analysis of Syverson’s Rational Exchange Protocol[C]∥Computer Security Foundations Workshop(CSFW).IEEE,2002:193. [8]ALCAIDE A,ESTEVEZ-TAPIADOR J M,HERNANDEZ-CA- STRO J C,et al.An extended model of rational exchange based on dynamic games of imperfect information[M]∥Emerging Trends in Information and Communication Security.Berlin:Springer,2006:396-408. [9]ESTEVEZ-TAPIADOR J M,ALCAIDE A,HERNANDEZ-CAS- TRO J C,et al.Bayesian rational exchange[J].International Journal of Information Security,2008,7(1):85-100. [10]ALCAIDE A,ESTEVEZ-TAPIADOR J M,HERNANDEZ-CAS- TRO J C,et al.A multi-party rational exchange protocol[C]∥Proceedings of Workshops on the Move to Meaningful Internet Systems.Berlin:Springer,2007:42-43. [11]CAMPOS F A,PHAM V.Rational information exchange mo- del:A new optimization approach for equilibrium computing[C]∥Proceedings of the 6th International Conference on Modeling,Simulation,and Applied Optimization.IEEE,2015:1-6. [12]TAO X,LI G,SUN D,et al.A game-theoretic model and analysis of data exchange protocols for Internet of Things in clouds[J].Future Generation Computer Systems,2016,76:582-589. [13]LV Z,PENG C G,LIU H,et al.Rational fairness exchange protocols based on maximum entropy principle[J].Application Research of Computers,2014,31(2):563-567.(in Chinese) 吕桢,彭长根,刘海,等.基于极大熵原理的理性公平交换协议[J].计算机应用研究,2014,31(2):563-567. [14]LIU H,PENG C G,ZHANG H,et al.Game Logic Formal Model of Rational Secure Protocol[J].Computer Science,2015,42(9):118-126.(in Chinese) 刘海,彭长根,张弘,等.一种理性安全协议的博弈逻辑描述模型[J].计算机科学,2015,42(9):118-126. [15]NIU C C,PENG C G,LI X.Rational Model of Exchange Protocol and Its Mechanism Design on Fairness[J].Application Research of Computer,2017,34(5):1504-1508.(in Chinese) 牛翠翠,彭长根,李新.一种交换协议的理性模型及其公平机制设计[J].计算机应用研究,2017,34(5):1504-1508. [16]ZHAO J,WU X H,TAO J.A Rational Exchange Protocol Model Based on Dynamic Game[J].Computer Applications and Software,2011,28(7):121-124.(in Chinese) 赵君,吴小红,陶杰.一种基于动态博弈的理性交换协议模型[J].计算机应用与软件,2011,28(7):121-124. [17]ZHOU X,JIN J H,LI Y B,et al.Multi-Party Fair Exchange Protocol Based on Rational Secure Sharing[J].Journal of Information Engineering University,2016,17(6):705-708.(in Chinese) 周燮,金江浩,李延斌,等.基于理性秘密共享的多方公平交换协议[J].信息工程大学学报,2016,17(6):705-708. [18]SIMON H A.A Behavioral Model of Rational Choice[J].Quarterly Journal of Economics,1955,69(1):99-118. [19]ELLSBERG D.Risk,Ambiguity,and the Savage Axioms[J].Quarterly Journal of Economics,1961,75(4):643-669. [20]ALLAIS M,HAGEN O.Expected Utility Hypotheses and the Allais Paradox[J].Journal of the American Statistical Association,1979,79(385):224. [21]HALPERN J,TEAGUE V.Rational secret sharing and multiparty computation:extendedabstract[C]∥Thirty-Sixth ACM Symposium on Theory of Computing.ACM,2004:623-632. [22]TIAN Y,MA J,PENG C,et al.Secret Sharing Scheme with Fairness[C]∥IEEE International Conference on Trust,Security and Privacy in Computing and Communications.IEEE,2011:494-500. [23]CAMERER C,HO T H.Experience-weighted Attraction Lear- ning in Normal Form Games-Camerer-2003-Econometrica - Wiley Online Library[J].Econometrica,2010,67(4):827-874. [24]NI S B.Design and Implementation of Two Kinds of Multi-agent Platform Integration Schemes[D].Kunming:Yunnan University,2015.(in Chinese) 倪盛斌.两种多主体平台集成方案的设计与实现[D].昆明:云南大学,2015. |
[1] | ZHU Kai, WU Guo-qing, YUAN Meng-ting. On Hardness of Approximation for Optimized Problem of Synchronizing Partially Specified Deterministic Finite Automata [J]. Computer Science, 2020, 47(5): 14-21. |
[2] | ZHANG Ju-xiao. Application of Nondeterministic Finite Automata in Braille Transcoding [J]. Computer Science, 2017, 44(1): 271-276. |
[3] | SHEN Dan-dan, WANG Li-hua, WANG Yu and WANG Zhen-zhou. Simulation and Analysis of AODV Protocol in Fishing Marine VHF Ad Hoc Network [J]. Computer Science, 2016, 43(Z6): 285-287. |
[4] | ZHANG Ya-hong,ZHANG Lin-lin,ZHAO Kai,CHEN Jia-li and FENG Zai-wen. Runtime Verification Method for Web Service Based on UML2.0Sequence Diagrams [J]. Computer Science, 2013, 40(7): 138-138. |
[5] | GUO Yan-yan and LIU Jing-lei. Formalization for Model Element of UML Statechart in RSL [J]. Computer Science, 2013, 40(5): 177-183. |
[6] | . Efficient Regular Expression Matching Algorithm Based on DoLFA [J]. Computer Science, 2012, 39(9): 15-19. |
[7] | . Validation of Web Service Composition Based on Probabilistic Model Checking [J]. Computer Science, 2012, 39(1): 120-123. |
[8] | LI Yan (College of Information Science and Engineering, Zhejiang Normal University, Jinhua 321004). [J]. Computer Science, 2006, 33(2): 155-157. |
|