Adversary

Results: 851



#Item
1The Multiplicative Quantum Adversary ∗ ˇ Robert Spalek

The Multiplicative Quantum Adversary ∗ ˇ Robert Spalek

Add to Reading List

Source URL: www.ucw.cz

Language: English - Date: 2007-08-15 15:10:04
    2Transcripts – Bankruptcy and Adversary  Docketing Event  Bankruptcy/Adversary > Notices > Notice of Intent to Request Redaction of Transcript  Bankruptcy/Adversary > Miscellaneous > Statement of Personal Data Ide

    Transcripts – Bankruptcy and Adversary Docketing Event  Bankruptcy/Adversary > Notices > Notice of Intent to Request Redaction of Transcript  Bankruptcy/Adversary > Miscellaneous > Statement of Personal Data Ide

    Add to Reading List

    Source URL: www.flmb.uscourts.gov

    Language: English - Date: 2018-01-24 15:34:53
      3Oft Target Tor adversary models that don’t miss the mark 1.  Aaron D. Jaggard

      Oft Target Tor adversary models that don’t miss the mark 1. Aaron D. Jaggard

      Add to Reading List

      Source URL: petsymposium.org

      Language: English - Date: 2017-10-04 16:18:51
        4Developing Simulated Cyber-Attack Scenarios Against Virtualized Adversary Networks Luis Aybar, Gurminder Singh and Alan Shaffer Naval Postgraduate School, Monterey, USA

        Developing Simulated Cyber-Attack Scenarios Against Virtualized Adversary Networks Luis Aybar, Gurminder Singh and Alan Shaffer Naval Postgraduate School, Monterey, USA

        Add to Reading List

        Source URL: faculty.nps.edu

        Language: English - Date: 2018-03-15 16:39:23
          5Active Adversary Lecture 7 CCA Security  MAC

          Active Adversary Lecture 7 CCA Security MAC

          Add to Reading List

          Source URL: courses.engr.illinois.edu

          Language: English - Date: 2016-02-11 11:49:57
          6An Adversary-Centric Behavior Modeling of DDoS Attacks An Wang Aziz Mohaisen

          An Adversary-Centric Behavior Modeling of DDoS Attacks An Wang Aziz Mohaisen

          Add to Reading List

          Source URL: www.cs.ucf.edu

          Language: English - Date: 2017-08-24 12:04:24
            7All Quantum Adversary Methods are Equivalent 1,? ˇ Robert Spalek and Mario Szegedy 2,?? 1

            All Quantum Adversary Methods are Equivalent 1,? ˇ Robert Spalek and Mario Szegedy 2,?? 1

            Add to Reading List

            Source URL: www.ucw.cz

            Language: English - Date: 2006-10-04 14:42:59
              8Egalitarian computing Alex Biryukov University of Luxembourg Abstract In this paper we explore several contexts where an adversary has an upper hand over the defender by using special hardware in an attack. These include

              Egalitarian computing Alex Biryukov University of Luxembourg Abstract In this paper we explore several contexts where an adversary has an upper hand over the defender by using special hardware in an attack. These include

              Add to Reading List

              Source URL: www.cryptolux.org

              Language: English - Date: 2016-06-09 06:04:52
                9Complexity: the silent cyber adversary Robert Gardner  Isis Rose

                Complexity: the silent cyber adversary Robert Gardner Isis Rose

                Add to Reading List

                Source URL: s3.amazonaws.com

                - Date: 2017-09-26 14:02:27
                  10Byzantine Agreement with a Rational Adversary Adam Groce, Jonathan Katz? , Aishwarya Thiruvengadam, and Vassilis Zikas?? Department of Computer Science, University of Maryland {agroce,jkatz,aish,vzikas}@cs.umd.edu  Abstr

                  Byzantine Agreement with a Rational Adversary Adam Groce, Jonathan Katz? , Aishwarya Thiruvengadam, and Vassilis Zikas?? Department of Computer Science, University of Maryland {agroce,jkatz,aish,vzikas}@cs.umd.edu Abstr

                  Add to Reading List

                  Source URL: www.cs.rpi.edu

                  Language: English - Date: 2012-07-09 12:52:40