Inproceedings,

Game theory with costly computation: formulation and application to protocol security.

, and .
BQGT, page 89:1. ACM, (2010)

Meta data

Tags

Users

  • @dblp
  • @ytyoun

Comments and Reviews