Adversary model

Results: 85



#Item
31Network architecture / Routing / Cryptographic software / Onion routing / Tor / Static routing / Router / Proxy server / Adversary model / Computing / Internet privacy / Internet

Trust-based Anonymous Communication: Adversary Models and Routing Algorithms ∗ Aaron Johnson

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2011-09-03 19:34:39
32Applied mathematics / Computer science / Algorithm / Adversary model / Competitive analysis / Euclidean algorithm / Analysis of algorithms / Online algorithms / Mathematics

Online Assignment of Heterogeneous Tasks in Crowdsourcing Markets Sepehr Assadi, Justin Hsu, Shahin Jabbari Department of Computer and Information Science, University of Pennsylvania {sassadi, justhsu, jabbari}@cis.upenn

Add to Reading List

Source URL: justinh.su

Language: English - Date: 2015-05-13 13:11:34
33Zero-knowledge proof / Adversary model / Advantage / IP / Public-key cryptography / Communications protocol / Malleability / Cryptography / Cryptographic protocols / Commitment scheme

Constant-Round Coin-Tossing With a Man in the Middle or Realizing the Shared Random String Model Boaz Barak∗ May 19, 2008

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:51:33
34Analysis of algorithms / Time complexity / Randomized algorithm / Algorithm / Adversary model / Decision tree model / Big O notation / Binary search algorithm / NP / Theoretical computer science / Applied mathematics / Computational complexity theory

PDF Document

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-12-28 08:41:16
35Opinion poll / Democratic Party / Adversary model / Pew Research Center / Research / Statistics / Public opinion / Presidency of Barack Obama

NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE MARCH 25, 2014 FOR FURTHER INFORMATION ON THIS REPORT:

Add to Reading List

Source URL: www.people-press.org

Language: English - Date: 2015-04-06 10:29:06
36Models of computation / Decision tree model / Quantum algorithm / Quantum computer / PP / Theoretical computer science / Applied mathematics / Computational complexity theory

Quantum Adversary (Upper) Bound

Add to Reading List

Source URL: cjtcs.cs.uchicago.edu

Language: English - Date: 2013-04-06 19:44:11
37Analysis of algorithms / Artificial intelligence / Game theory / Markov models / Tambe / Adversary model / Stackelberg competition / Markov decision process / Uncertainty / Statistics / Science / Markov processes

Journal of Artificial Intelligence Research367 Submitted 1/14; published 6/14 Game-Theoretic Security Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System

Add to Reading List

Source URL: www.jair.org

Language: English - Date: 2014-06-19 15:08:32
38Randomness / Analysis of algorithms / Probabilistic complexity theory / Design of experiments / Randomized algorithm / Random number generation / Randomization / NL / Adversary model / Theoretical computer science / Computational complexity theory / Applied mathematics

Chapter 6: Randomization Quotation Algorithmic Adventures From Knowledge to Magic

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2011-10-24 15:11:44
39Diffie–Hellman key exchange / Key-agreement protocol / Advantage / Diffie–Hellman problem / Cryptographic nonce / Adversary model / SPEKE / Secure Remote Password protocol / Cryptography / Cryptographic protocols / Random oracle

A preliminary version appears in ISC 2009, Lecture Notes in Computer Science, Springer-Verlag, 2009. This version is dated December 18, 2009. Security Analysis of the PACE Key-Agreement Protocol Jens Bender1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-18 06:37:52
40Software / Universal composability / Data / Secure multi-party computation / Advantage / Actor model / Ciphertext indistinguishability / Adversary model / Security parameter / Cryptographic protocols / Cryptography / Computing

On Concurrently Secure Computation in the Multiple Ideal Query Model∗ Abhishek Jain‡ Vipul Goyal†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-07 10:35:40
UPDATE