2011
DOI: 10.1109/tsmcc.2010.2050686
|View full text |Cite
|
Sign up to set email alerts
|

A Unified Framework for the Analysis of Availability, Reliability and Security, With Applications to Quantum Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 31 publications
0
12
0
Order By: Relevance
“…Common to all these references are their strong hypotheses on the underlying network graph topology, which gave rise to the game-theoretic treatment in [9] attempting to apply these ideas in general rather than only strongly connected networks. Ever since then, the picture has been extended in various ways, such as by looking for lower bounds on the graph connectivity [8], [10]- [14] implications of synchrony and asynchrony in the transmission [15], [16] impossibility results [17], [18] or applications of MPT in ad hoc and wireless networks [19]- [23].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Common to all these references are their strong hypotheses on the underlying network graph topology, which gave rise to the game-theoretic treatment in [9] attempting to apply these ideas in general rather than only strongly connected networks. Ever since then, the picture has been extended in various ways, such as by looking for lower bounds on the graph connectivity [8], [10]- [14] implications of synchrony and asynchrony in the transmission [15], [16] impossibility results [17], [18] or applications of MPT in ad hoc and wireless networks [19]- [23].…”
Section: Related Workmentioning
confidence: 99%
“…Put differently, if the advantage is computed as the Nash-equilibrium solution , then this value lower-bounds the success-rate of the MPTprotocol regardless of what the attacker actually does (see [9] and [32] for formal proofs), conditional on the only hypothesis that no attack outside is mounted (in which case, however, any security analysis would fail). www.ijacsa.thesai.org…”
Section: ) Output As the Game's Outcomementioning
confidence: 99%
“…At this point, we can invoke game-theory to provide us with the best way of choosing among our options (paths). A full discussion of this idea is given by Rass & Schartner (2010b), and we will use a simple example to illustrate the idea here.…”
Section: Tr U S T E D Re L Aymentioning
confidence: 99%
“…In case that the adversary does not play a zero-sum regime, the equality changes into a lower-bound to the probability (this can be proven by twice-exploitation of the saddle-point property of the Nash-equilibrium; cf. Rass & Schartner (2010b)). …”
Section: Tr U S T E D Re L Aymentioning
confidence: 99%
See 1 more Smart Citation