Introdution
Security research continues to provide a plethora of new protocols and mechanisms; these solutions patch either existing vulnerabilities found in practical systems or solve hypothetical security problems in the sense that the problem is often conceived at the same time when the first solution is proposed. Yet only a very small fraction of this research is relevant to ordinary users in the sense that they are willing to actually deploy the technology.
Chapter PDF
Similar content being viewed by others
References
Anderson, R., Moore, T.: The economics of information security. Science 314, 610–613 (2006)
Nielsen, J.B. (ed.): Summary Report on Rational Cryptographic Protocols. Deliverable D.PROVI.7. ECRYPT IST-2002-507932 (January 2007)
Nisan, N., Ronen, A.: Algorithmic mechanism design. Games and Economic Behavior 35, 166–196 (2001)
Nisan, N., Roughgarden, T., Tardos, E., Vazirani, V.V. (eds.): Algorithmic Game Theory. Cambridge University Press, Cambridge (2007)
Ozment, A., Schechter, S.E.: Bootstrapping the adoption of internet security protocols. In: Proc. 5th Economics of Information Security (2006), http://weis2006.econinfosec.org/docs/46_OnlinePDF.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 IFIP International Federation for Information Processing
About this paper
Cite this paper
Cachin, C. (2009). Rational Protocols. In: Camenisch, J., Kesdogan, D. (eds) iNetSec 2009 – Open Research Problems in Network Security. 2009. IFIP Advances in Information and Communication Technology, vol 309. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05437-2_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-05437-2_9
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-05436-5
Online ISBN: 978-3-642-05437-2
eBook Packages: Computer ScienceComputer Science (R0)