Author:
Margolin N. Boris,Levine Brian Neil,Miller James D.,Wright Matthew
Subject
Management of Technology and Innovation,Marketing,Computer Networks and Communications,Computer Science Applications
Reference23 articles.
1. Aiello, W., Bellovin, S. M., Blaze, M., Ioannidis, J., Reingold, O., Canetti, R., and Keromytis, A. D. Efficient, DoS-resistant, secure key exchange for Internet protocols. In Proceedings of the ACM Conference on Computer and Communications Security (CCS ’02), October 2002.
2. Meaningful cheap talk must improve equilibrium payoffs;Arvan;Mathematical Social Sciences,1999
3. Arms races and negotiations;Baliga;Review of Economic Studies,2004
4. Bao, F., Deng, R. H., and Mao, W. Efficient and practical fair exchange protocols with off-line TTP. In Proceedings of the 1998 IEEE Symposium on Security and Privacy (S&P ’98), May 1998.
5. Berthold, O., Federrath, H., and Kohntopp, M. Project anonymity and unobservability in the Internet. In Computers Freedom And Privacy Conference (CFP 2000) Workshop on Freedom and Privacy by Design, April 2000.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献