Adversary

Results: 851



#Item
1

The Multiplicative Quantum Adversary ∗ ˇ Robert Spalek

Add to Reading List

Source URL: www.ucw.cz

Language: English - Date: 2007-08-15 15:10:04
    2

    Transcripts – Bankruptcy and Adversary Docketing Event  Bankruptcy/Adversary > Notices > Notice of Intent to Request Redaction of Transcript  Bankruptcy/Adversary > Miscellaneous > Statement of Personal Data Ide

    Add to Reading List

    Source URL: www.flmb.uscourts.gov

    Language: English - Date: 2018-01-24 15:34:53
      3

      Oft Target Tor adversary models that don’t miss the mark 1. Aaron D. Jaggard

      Add to Reading List

      Source URL: petsymposium.org

      Language: English - Date: 2017-10-04 16:18:51
        4

        Developing Simulated Cyber-Attack Scenarios Against Virtualized Adversary Networks Luis Aybar, Gurminder Singh and Alan Shaffer Naval Postgraduate School, Monterey, USA

        Add to Reading List

        Source URL: faculty.nps.edu

        Language: English - Date: 2018-03-15 16:39:23
          5Cryptography / Chosen-ciphertext attack / Ciphertext / RSA / Encryption / Chosen-plaintext attack / Semantic security

          Active Adversary Lecture 7 CCA Security MAC

          Add to Reading List

          Source URL: courses.engr.illinois.edu

          Language: English - Date: 2016-02-11 11:49:57
          6

          An Adversary-Centric Behavior Modeling of DDoS Attacks An Wang Aziz Mohaisen

          Add to Reading List

          Source URL: www.cs.ucf.edu

          Language: English - Date: 2017-08-24 12:04:24
            7

            All Quantum Adversary Methods are Equivalent 1,? ˇ Robert Spalek and Mario Szegedy 2,?? 1

            Add to Reading List

            Source URL: www.ucw.cz

            Language: English - Date: 2006-10-04 14:42:59
              8

              Egalitarian computing Alex Biryukov University of Luxembourg Abstract In this paper we explore several contexts where an adversary has an upper hand over the defender by using special hardware in an attack. These include

              Add to Reading List

              Source URL: www.cryptolux.org

              Language: English - Date: 2016-06-09 06:04:52
                9

                Complexity: the silent cyber adversary Robert Gardner Isis Rose

                Add to Reading List

                Source URL: s3.amazonaws.com

                - Date: 2017-09-26 14:02:27
                  10

                  Byzantine Agreement with a Rational Adversary Adam Groce, Jonathan Katz? , Aishwarya Thiruvengadam, and Vassilis Zikas?? Department of Computer Science, University of Maryland {agroce,jkatz,aish,vzikas}@cs.umd.edu Abstr

                  Add to Reading List

                  Source URL: www.cs.rpi.edu

                  Language: English - Date: 2012-07-09 12:52:40
                    UPDATE