T. Ågotnes
W. van der Hoek
M. Wooldridge
2010
Robust normative systems and a logic of norm compliance
Logic Journal of the IGPL
18
1
4–30
10.1093/jigpal/jzp070
G. Asharov
R. Canetti
C. Hazay
2011
Towards a Game Theoretic View of Secure Computation
Proceedings of EUROCRYPT
426–445
10.1007/978-3-642-20465-4_24
N. Asokan
V. Shoup
M. Waidner
1998
Asynchronous protocols for optimistic fair exchange
Proceedings of the IEEE Symposium on Research in Security and Privacy
IEEE Computer Society Press
86–99
10.1109/SECPRI.1998.674826
L. Buttyán
J. Hubaux
S. Čapkun
2004
A formal model of rational exchange and its application to the analysis of Syverson's protocol
Journal of Computer Security
12
3,4
551–587
K. Chatterjee
V. Raman
2010
Assume-Guarantee Synthesis for Digital Contract Signing
CoRR
abs/1004.2697
Y. Dodis
T. Rabin
2007
Cryptography and Game Theory
Algorithmic Game Theory
8
181–208
10.1017/CBO9780511800481.010
G. Fuchsbauer
J. Katz
D. Naccache
2010
Efficient Rational Secret Sharing in Standard Communication Networks
Proceedings of TCC
419–436
10.1007/978-3-642-11799-2_25
A. Groce
J. Katz
2012
Fair Computation with Rational Players
Proceedings of EUROCRYPT
81–98
10.1007/978-3-642-29011-4_7
W. Jamroga
M. Melissen
H. Schnoor
2013
Defendable Security in Interaction Protocols
Proceedings of the 16th International Conference on Principles and Practice of Multi-Agent Systems PRIMA 2013
LNCS
8291
Springer
132–148
10.1007/978-3-642-44927-7_10
S. Kremer
J. Raskin
2002
Game Analysis of Abuse-Free Contract Signing
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW'02)
IEEE Computer Society Press
206–220
10.1109/CSFW.2002.1021817
S. Kremer
J.-F. Raskin
2003
A game-based verification of non-repudiation and fair exchange protocols
Journal of Computer Security
11
3
10.1007/3-540-44685-0_37
T. Moore
R. Anderson
2011
Economics and Internet Security: a Survey of Recent Analytical, Empirical and Behavioral Research
Technical Report
TR-03-11
Computer Science Group, Harvard University
M. Osborne
A. Rubinstein
1994
A Course in Game Theory
MIT Press
P. Syverson
1998
Weakly Secret Bit Commitment: Applications to Lotteries and Fair Exchange
Proceedings of CSFW
2–13
10.1109/CSFW.1998.683149