Adversary

Results: 851



#Item
41	INSTRUCTIONS FOR APPENDIX A

INSTRUCTIONS FOR APPENDIX A

Add to Reading List

Source URL: www.abcworld.org

Language: English - Date: 2008-08-27 13:06:55
42Online Algorithms Susanne Albers Stefano Leonardiy  Over the past twelve years, online algorithms have received considerable research interest. Online

Online Algorithms Susanne Albers Stefano Leonardiy Over the past twelve years, online algorithms have received considerable research interest. Online

Add to Reading List

Source URL: www14.in.tum.de

Language: English - Date: 2013-11-25 11:05:41
43Circular chosen-ciphertext security with compact ciphertexts Dennis Hofheinz∗ January 19, 2013 Abstract A key-dependent message (KDM) secure encryption scheme is secure even if an adversary

Circular chosen-ciphertext security with compact ciphertexts Dennis Hofheinz∗ January 19, 2013 Abstract A key-dependent message (KDM) secure encryption scheme is secure even if an adversary

Add to Reading List

Source URL: www.kjdf.de

Language: English - Date: 2014-06-10 05:37:34
    44Exploitation as an Inference Problem David Cock NICTA and University of New South Wales  ABSTRACT In this position paper, we suggest that an adversary seeking to exploit a side channel should be view

    Exploitation as an Inference Problem David Cock NICTA and University of New South Wales ABSTRACT In this position paper, we suggest that an adversary seeking to exploit a side channel should be view

    Add to Reading List

    Source URL: research.davidcock.fastmail.fm

    Language: English - Date: 2014-11-20 18:54:15
      45Adversary Gain vs. Defender Loss in Quantified Information Flow Piotr Mardziel,† Mário S. Alvim,‡ and Michael Hicks,† † University of Maryland, College Park ‡ Universidade Federal de Minas Gerais

      Adversary Gain vs. Defender Loss in Quantified Information Flow Piotr Mardziel,† Mário S. Alvim,‡ and Michael Hicks,† † University of Maryland, College Park ‡ Universidade Federal de Minas Gerais

      Add to Reading List

      Source URL: software.imdea.org

      Language: English - Date: 2014-07-17 09:25:53
      46MACs and Authenticated Encryption February 7, 2013 Introduction Information Security consists of: – Confidentiality (achieved through encryption, aims to prevent adversary from reading a

      MACs and Authenticated Encryption February 7, 2013 Introduction Information Security consists of: – Confidentiality (achieved through encryption, aims to prevent adversary from reading a

      Add to Reading List

      Source URL: users.encs.concordia.ca

      Language: English - Date: 2013-08-05 10:54:57
        47Optimal Projective Algorithms for the List Update Problem Christoph Amb¨uhl1 , Bernd G¨artner1 , and Bernhard von Stengel2 1  Institute for Theoretical Computer Science, ETH Z¨urich, 8092 Z¨urich, Switzerland.

        Optimal Projective Algorithms for the List Update Problem Christoph Amb¨uhl1 , Bernd G¨artner1 , and Bernhard von Stengel2 1 Institute for Theoretical Computer Science, ETH Z¨urich, 8092 Z¨urich, Switzerland.

        Add to Reading List

        Source URL: www.maths.lse.ac.uk

        Language: English - Date: 2010-01-11 12:21:35
        48Transiting Areas Patrolled by a Mobile Adversary Ondˇrej Vanˇek, Branislav Boˇsansk´y, Michal Jakob and Michal Pˇechouˇcek which it chooses a closed-walk starting and ending in a given location in the area, termed

        Transiting Areas Patrolled by a Mobile Adversary Ondˇrej Vanˇek, Branislav Boˇsansk´y, Michal Jakob and Michal Pˇechouˇcek which it chooses a closed-walk starting and ending in a given location in the area, termed

        Add to Reading List

        Source URL: game.itu.dk

        Language: English - Date: 2010-08-10 12:41:00
        49Theoretical Computer Science–16  www.elsevier.com/locate/tcs A new lower bound for the list update problem in the partial cost model

        Theoretical Computer Science–16 www.elsevier.com/locate/tcs A new lower bound for the list update problem in the partial cost model

        Add to Reading List

        Source URL: www.maths.lse.ac.uk

        Language: English - Date: 2002-11-18 18:10:24
        50Byzantine Agreement with a Rational Adversary Adam Groce, Jonathan Katz? , Aishwarya Thiruvengadam, and Vassilis Zikas?? Department of Computer Science, University of Maryland {agroce,jkatz,aish,vzikas}@cs.umd.edu  Abstr

        Byzantine Agreement with a Rational Adversary Adam Groce, Jonathan Katz? , Aishwarya Thiruvengadam, and Vassilis Zikas?? Department of Computer Science, University of Maryland {agroce,jkatz,aish,vzikas}@cs.umd.edu Abstr

        Add to Reading List

        Source URL: people.inf.ethz.ch

        Language: English - Date: 2012-07-09 12:52:40