Oana Ciobotaru

  • Citations Per Year
Learn More
Performing some task among a set of agents requires the use of some protocol that regulates the interactions between them. If those agents are rational, they may try to subvert the protocol for their own benefit, in an attempt to reach an outcome that provides greater utility. We revisit the traditional notion of self-enforcing protocols implemented using(More)
Over the years, various security notions have been proposed in order to cope with a wide range of security scenarios. Recently, the study of security notions has been extended towards comparing cryptographic definitions of secure implementation with game-theoretic definitions of universal implementation of a trusted mediator. In this work we go a step(More)
The proliferation of P2P computing has recently been propelled by popular applications, most notably file sharing protocols such as BitTorrent. These protocols provide remarkable efficiency and scalability, as well as adaptivity to dynamic situations. However, none of them is secure against attacks from rational users, i.e., users that misuse the protocol(More)
DOINA CARINA VOINESCU1*, OANA ROXANA CIOBOTARU1*, OCTAVIAN CATALIN CIOBOTARU1, ALINA PREDA2, VASILE VALERIU LUPU3*, MALINA BERCIU COMAN1, MANUELA ARBUNE1 1 Clinical Department, Faculty of Medicine and Pharmacy, Dunãrea de Jos University of Galaþi,A lexandru Ioan Cuza Str., 800008, Galati, Romania 2 Mina Minovici National Institute of Legal Medicine, 9(More)
  • 1