-
2
-
-
84929273746
-
Untraceable electronic cash
-
Goldwasser, S. (ed.),,. Springer, Heidelberg
-
Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319-327. Springer, Heidelberg (1990).
-
(1990)
CRYPTO 1988. LNCS
, vol.403
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
3
-
-
84865819620
-
Bitter to better-how to make Bitcoin a better currency
-
Keromytis, A.D. (ed.),,. Springer, Heidelberg
-
Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better-how to make Bitcoin a better currency. In: Keromytis, A. D. (ed.) FC 2012. LNCS, vol. 7397, pp. 399-414. Springer, Heidelberg (2012).
-
(2012)
FC 2012. LNCS
, vol.7397
, pp. 399-414
-
-
Barber, S.1
Boyen, X.2
Shi, E.3
Uzun, E.4
-
4
-
-
0000544475
-
Currency competition, network externalities and switching costs: Towards an alternative view of optimum currency areas
-
Dowd, K., Greenaway, D.: Currency competition, network externalities and switching costs: towards an alternative view of optimum currency areas. Econ. J. 103(420), 1180-1189 (1993).
-
(1993)
Econ. J
, vol.103
, Issue.420
, pp. 1180-1189
-
-
Dowd, K.1
Greenaway, D.2
-
6
-
-
84910624054
-
Empirical analysis of Denial-of-Service attacks in the Bitcoin ecosystem
-
Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.),,. Springer, Heidelberg
-
Vasek, M., Thornton, M., Moore, T.: Empirical analysis of Denial-of-Service attacks in the Bitcoin ecosystem. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014 Workshops. LNCS, vol. 8438, pp. 57-71. Springer, Heidelberg (2014).
-
(2014)
FC 2014 Workshops. LNCS
, vol.8438
, pp. 57-71
-
-
Vasek, M.1
Thornton, M.2
Moore, T.3
-
7
-
-
84883269768
-
Beware the middleman: Empirical analysis of Bitcoinexchange risk
-
Sadeghi, A.-R. (ed.),,. Springer, Heidelberg
-
Moore, T., Christin, N.: Beware the middleman: empirical analysis of Bitcoinexchange risk. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 25-33. Springer, Heidelberg (2013).
-
(2013)
FC 2013. LNCS
, vol.7859
, pp. 25-33
-
-
Moore, T.1
Christin, N.2
-
8
-
-
70350389209
-
Blue versus red: Towards a model of distributed security attacks
-
Dingledine, R., Golle, P. (eds.),,. Springer, Heidelberg
-
Fultz, N., Grossklags, J.: Blue versus red: towards a model of distributed security attacks. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 167-183. Springer, Heidelberg (2009).
-
(2009)
FC 2009. LNCS
, vol.5628
, pp. 167-183
-
-
Fultz, N.1
Grossklags, J.2
-
9
-
-
57349198694
-
Secure or insure? a game-theoretic analysis of information security games
-
Beijing, China, April 2008
-
Grossklags, J., Christin, N., Chuang, J.: Secure or insure? a game-theoretic analysis of information security games. In: Proceedings of the 2008 World Wide Web Conference (WWW'08), Beijing, China, April 2008, pp. 209-218 (2008).
-
(2008)
Proceedings of the 2008 World Wide Web Conference (WWW'08)
, pp. 209-218
-
-
Grossklags, J.1
Christin, N.2
Chuang, J.3
-
10
-
-
77955321664
-
When information improves information security
-
Sion, R. (ed.),,. Springer, Heidelberg
-
Grossklags, J., Johnson, B., Christin, N.: When information improves information security. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 416-423. Springer, Heidelberg (2010).
-
(2010)
FC 2010. LNCS
, vol.6052
, pp. 416-423
-
-
Grossklags, J.1
Johnson, B.2
Christin, N.3
-
11
-
-
33750482906
-
System reliability and free riding
-
Camp, L., Lewis, S. (eds.),,. Kluwer, Dordrecht
-
Varian, H.: System reliability and free riding. In: Camp, L., Lewis, S. (eds.) Economics of Information Security. Advances in Information Security, vol. 12, pp. 1-15. Kluwer, Dordrecht (2004).
-
(2004)
Economics of Information Security. Advances in Information Security
, vol.12
, pp. 1-15
-
-
Varian, H.1
-
12
-
-
34248574143
-
Asymmetric conflict: Weakest link against best shot
-
Clark, D., Konrad, K.: Asymmetric conflict: weakest link against best shot. J. Conflict Resolut. 51(3), 457-469 (2007).
-
(2007)
J. Conflict Resolut
, vol.51
, Issue.3
, pp. 457-469
-
-
Clark, D.1
Konrad, K.2
-
13
-
-
66549093519
-
Decision-theoretic and game-theoretic approaches to IT security investment
-
Cavusoglu, H., Raghunathan, S., Yue, W.: Decision-theoretic and game-theoretic approaches to IT security investment. J. Manag. Inf. Syst. 25(2), 281-304 (2008).
-
(2008)
J. Manag. Inf. Syst
, vol.25
, Issue.2
, pp. 281-304
-
-
Cavusoglu, H.1
Raghunathan, S.2
Yue, W.3
-
14
-
-
84909999858
-
Understanding and influencing attackers' decisions: Implications for security investment strategies
-
Cambridge, UK, June
-
Cremonini, M., Nizovtsev, D.: Understanding and influencing attackers' decisions: Implications for security investment strategies. In: Proceedings of the Fifth Annual Workshop on Economics and Information Security (WEIS), Cambridge, UK, June 2006.
-
(2006)
Proceedings of the Fifth Annual Workshop on Economics and Information Security (WEIS)
-
-
Cremonini, M.1
Nizovtsev, D.2
-
15
-
-
35248853499
-
How much security is enough to stop a thief?
-
Wright, R.N. (ed.),,. Springer, Heidelberg
-
Schechter, S. E., Smith, M. D.: How much security is enough to stop a thief? In: Wright, R. N. (ed.) FC 2003. LNCS, vol. 2742, pp. 122-137. Springer, Heidelberg (2003).
-
(2003)
FC 2003. LNCS
, vol.2742
, pp. 122-137
-
-
Schechter, S.E.1
Smith, M.D.2
-
16
-
-
0000787258
-
Crime and punishment: An economic approach
-
Becker, G.: Crime and punishment: an economic approach. J. Polit. Econ. 76(2), 169-217 (1968).
-
(1968)
J. Polit. Econ
, vol.76
, Issue.2
, pp. 169-217
-
-
Becker, G.1
-
17
-
-
33750440197
-
The economics of information security
-
Anderson, R., Moore, T.: The economics of information security. Science 314(5799), 610-613 (2006).
-
(2006)
Science
, vol.314
, Issue.5799
, pp. 610-613
-
-
Anderson, R.1
Moore, T.2
-
18
-
-
84910012094
-
-
Technical report CRYSYS-TR-2012-11-15, CrySyS Lab, Budapest University of Technology and Economics
-
Laszka, A., Felegyhazi, M., Buttyán, L.: A survey of interdependent security games. Technical report CRYSYS-TR-2012-11-15, CrySyS Lab, Budapest University of Technology and Economics (2012).
-
(2012)
A survey of interdependent security games
-
-
Laszka, A.1
Felegyhazi, M.2
Buttyán, L.3
-
19
-
-
84874284297
-
Game theory meets network security and privacy
-
Manshaei, M., Zhu, Q., Alpcan, T., Bacşar, T., Hubaux, J. P.: Game theory meets network security and privacy. ACM Comput. Surv. 45(3), 25: 1-25: 39 (2013).
-
(2013)
ACM Comput. Surv
, vol.45
, Issue.3
, pp. 25:1-25:39
-
-
Manshaei, M.1
Zhu, Q.2
Alpcan, T.3
Bacşar, T.4
Hubaux, J.P.5
-
20
-
-
16644384919
-
Incentive-based modeling and inference of attacker intent, objectives, and strategies
-
Liu, P., Zang, W., Yu, M.: Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Trans. Inf. Syst. Secur. 8(1), 78-118 (2005).
-
(2005)
ACM Trans. Inf. Syst. Secur
, vol.8
, Issue.1
, pp. 78-118
-
-
Liu, P.1
Zang, W.2
Yu, M.3
-
21
-
-
84885184956
-
A game theoretic defence framework against DoS/DDoS cyber attacks
-
Spyridopoulos, T., Karanikas, G., Tryfonas, T., Oikonomou, G.: A game theoretic defence framework against DoS/DDoS cyber attacks. Comput. Secur. 38, 39-50 (2013).
-
(2013)
Comput. Secur
, vol.38
, pp. 39-50
-
-
Spyridopoulos, T.1
Karanikas, G.2
Tryfonas, T.3
Oikonomou, G.4
-
22
-
-
78650626363
-
On modeling and simulation of game theory-based defense mechanisms against DOS and DDOS attacks
-
Wu, Q., Shiva, S., Roy, S., Ellis, C., Datla, V.: On modeling and simulation of game theory-based defense mechanisms against DOS and DDOS attacks. In: Proceedings of the 2010 Spring Simulation Multiconference, pp. 159: 1-159: 8 (2010).
-
(2010)
Proceedings of the 2010 Spring Simulation Multiconference
, pp. 159:1-159:8
-
-
Wu, Q.1
Shiva, S.2
Roy, S.3
Ellis, C.4
Datla, V.5
-
23
-
-
77956240814
-
Botnet economics: Uncertainty matters
-
Johnson, M. (ed.),. Springer, Heidelberg
-
Li, Z., Liao, Q., Striegel, A.: Botnet economics: uncertainty matters. In: Johnson, M. (ed.) Managing Information Risk and the Economics of Security, pp. 245-267. Springer, Heidelberg (2009).
-
(2009)
Managing Information Risk and the Economics of Security
, pp. 245-267
-
-
Li, Z.1
Liao, Q.2
Striegel, A.3
-
24
-
-
11244286140
-
Near rationality and competitive equilibria in networked systems
-
Christin, N., Grossklags, J., Chuang, J.: Near rationality and competitive equilibria in networked systems. In: Proceedings of the ACM SIGCOMM Workshop on Practice and Theory of Incentives in Networked Systems, pp. 213-219 (2004).
-
(2004)
Proceedings of the ACM SIGCOMM Workshop on Practice and Theory of Incentives in Networked Systems
, pp. 213-219
-
-
Christin, N.1
Grossklags, J.2
Chuang, J.3
-
25
-
-
84940409394
-
The economics of Bitcoin mining, or Bitcoin in the presence of adversaries
-
Washington, DC, June
-
Kroll, J., Davey, I., Felten, E.: The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In: Proceedings of the Twelfth Annual Workshop on Economics and Information Security (WEIS), Washington, DC, June 2013.
-
(2013)
Proceedings of the Twelfth Annual Workshop on Economics and Information Security (WEIS)
-
-
Kroll, J.1
Davey, I.2
Felten, E.3
-
26
-
-
84863512336
-
On Bitcoin and red balloons
-
Babaioff, M., Dobzinski, S., Oren, S., Zohar, A.: On Bitcoin and red balloons. In: Proceedings of the 13th ACM Conference on Electronic Commerce (EC), pp. 56-73 (2012).
-
(2012)
Proceedings of the 13th ACM Conference on Electronic Commerce (EC)
, pp. 56-73
-
-
Babaioff, M.1
Dobzinski, S.2
Oren, S.3
Zohar, A.4
|