@article(Agotnes10robust, author = "T. {\r A}gotnes and W. van der Hoek and M. Wooldridge", year = "2010", title = "Robust normative systems and a logic of norm compliance", journal = "Logic Journal of the IGPL", volume = "18", number = "1", pages = "4--30", doi = "10.1093/jigpal/jzp070", ) @inproceedings(Asharov11secure, author = "G. Asharov and R. Canetti and C. Hazay", year = "2011", title = "Towards a Game Theoretic View of Secure Computation", booktitle = "Proceedings of EUROCRYPT", pages = "426--445", doi = "10.1007/978-3-642-20465-4\_24", ) @inproceedings(Asokan98asynchronous, author = "N. Asokan and V. Shoup and M. Waidner", year = "1998", title = "Asynchronous protocols for optimistic fair exchange", booktitle = "Proceedings of the IEEE Symposium on Research in Security and Privacy", publisher = "IEEE Computer Society Press", pages = "86--99", doi = "10.1109/SECPRI.1998.674826", ) @article(Buttyan04formal, author = "L. Butty\'{a}n and J. Hubaux and S. \v {C}apkun", year = "2004", title = "A formal model of rational exchange and its application to the analysis of Syverson's protocol", journal = "Journal of Computer Security", volume = "12", number = "3,4", pages = "551--587", ) @article(Chatterjee10signing, author = "K. Chatterjee and V. Raman", year = "2010", title = "Assume-Guarantee Synthesis for Digital Contract Signing", journal = "CoRR", volume = "abs/1004.2697", ) @incollection(Dodis07cryptoGT, author = "Y. Dodis and T. Rabin", year = "2007", title = "Cryptography and Game Theory", booktitle = "Algorithmic Game Theory", chapter = "8", pages = "181--208", doi = "10.1017/CBO9780511800481.010", ) @inproceedings(Fuchsbauer10rational, author = "G. Fuchsbauer and J. Katz and D. Naccache", year = "2010", title = "Efficient Rational Secret Sharing in Standard Communication Networks", booktitle = "Proceedings of TCC", pages = "419--436", doi = "10.1007/978-3-642-11799-2\_25", ) @inproceedings(Groce12fair, author = "A. Groce and J. Katz", year = "2012", title = "Fair Computation with Rational Players", booktitle = "Proceedings of EUROCRYPT", pages = "81--98", doi = "10.1007/978-3-642-29011-4\_7", ) @inproceedings(Jamroga13defendable, author = "W. Jamroga and M. Melissen and H. Schnoor", year = "2013", title = "Defendable Security in Interaction Protocols", booktitle = "Proceedings of the 16th International Conference on Principles and Practice of Multi-Agent Systems PRIMA 2013", series = "LNCS", volume = "8291", publisher = "Springer", pages = "132--148", doi = "10.1007/978-3-642-44927-7\_10", ) @inproceedings(Kremer02game, author = "S. Kremer and J. Raskin", year = "2002", title = "Game Analysis of Abuse-Free Contract Signing", booktitle = "{P}roceedings of the 15th {IEEE} {C}omputer {S}ecurity {F}oundations {W}orkshop ({CSFW}'02)", publisher = "{IEEE} Computer Society Press", pages = "206--220", doi = "10.1109/CSFW.2002.1021817", ) @article(Kremer03fairexchange, author = "S. Kremer and J.-F. Raskin", year = "2003", title = "A game-based verification of non-repudiation and fair exchange protocols", journal = "Journal of Computer Security", volume = "11", number = "3", doi = "10.1007/3-540-44685-0\_37", ) @techreport(Moore11economics, author = "T. Moore and R. Anderson", year = "2011", title = "Economics and Internet Security: a Survey of Recent Analytical, Empirical and Behavioral Research", type = "Technical Report", number = "TR-03-11", institution = "Computer Science Group, Harvard University", ) @book(Osborne94gamet, author = "M. Osborne and A. Rubinstein", year = "1994", title = "A Course in Game Theory", publisher = "MIT Press", ) @inproceedings(Syverson98weakly, author = "P. Syverson", year = "1998", title = "Weakly Secret Bit Commitment: Applications to Lotteries and Fair Exchange", booktitle = "Proceedings of CSFW", pages = "2--13", doi = "10.1109/CSFW.1998.683149", )