Adversary

Results: 851



#Item
21Road traffic management / Mathematical physics / Road transport / Law / Privacy / Adversary model / Traffic flow / Internet privacy / Applied mathematics / Business / Academia

C:/Users/Bin Zan/Dropbox/typeinst/IEEE6page.dvi

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2011-07-31 11:03:34
22Law / United States bankruptcy law / United States civil procedure / Federal Rules of Bankruptcy Procedure / Bankruptcy in the United States / Motion in United States law / Bankruptcy / Adversary proceeding in bankruptcy / Federal Rules of Civil Procedure / Complaint / United States bankruptcy court / Leo Stoller

Case: Date Filed: Page: 1 of 21

Add to Reading List

Source URL: www.georgiabankruptcyblog.com

Language: English - Date: 2016-04-11 11:15:27
23Cryptography / Public-key cryptography / Communications protocol / Data transmission / Digital signature / Short Message Service / Adversary / Peer-to-peer / Secure multi-party computation

A Game-Theoretic Framework for Analyzing Trust-Inference Protocols∗ Ruggero Morselli† Jonathan Katz†

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2006-03-28 14:11:04
24Technology / Electronics / Electromagnetism / Computer networking / Sensor node / Wireless sensor network / Signal-to-interference-plus-noise ratio / Radar / Adversary model / Beamforming / Computer network / Throughput

The 2011 Military Communications Conference - Track 3 - Cyber Security and Network Operations Multi-node Coordinated Jamming for Location Privacy Protection Sangho Oh

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2012-01-16 23:23:23
25Cryptography / Secret sharing / Public-key cryptography / Proactive secret sharing / Commitment scheme / Ciphertext indistinguishability / Adversary model / Digital signature / Encryption / Information-theoretic security

The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:37:31
26Economy / Finance / Money / Corporate crime / Great Recession / Criminal investigation / Madoff investment scandal / Economics / Securities Investor Protection Corporation / Bernard Madoff / Bankruptcy in the United States / Adversary proceeding in bankruptcy

smb Doc 90 FiledEntered:33:47 Pg 1 of 39

Add to Reading List

Source URL: www.madofftrustee.com

Language: English - Date: 2016-04-28 13:18:26
27Analysis of algorithms / Online algorithms / Adversary model / Algorithm / Mathematics

Algorithms and Data Structures (WS15/16) Example Solutions for Unit 3 Problem 1 Algorithm: for the simplicity let’s assume that n = 2k, algorithm can be easily modified if n = 2k + 1 by using one additional comparison

Add to Reading List

Source URL: www-tcs.cs.uni-sb.de

Language: English - Date: 2016-03-02 15:13:55
28Judicial branch of the United States government / Online law databases / Law / Government / CM/ECF / Legal documents / PACER / Bankruptcy / Notice of electronic filing / Adversary proceeding in bankruptcy / Pro se legal representation in the United States

Administrative Office of the U.S. Courts CM/ECF Bankruptcy Release 5.0 Notes for PACER Users

Add to Reading List

Source URL: www.pacer.gov

Language: English - Date: 2013-03-15 07:17:18
29Network performance / TCP congestion control / Throughput / Adversary model / Support / Mathematics

Dynamic Internet Congestion with Bursts Stefan Schmid1 and Roger Wattenhofer2 1 2

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:53
30Analysis of algorithms / Computer science / Mathematics / Theoretical computer science / Applied mathematics / Online algorithms / Probabilistic complexity theory / Randomized algorithms / Adversary model / Algorithm / Pseudorandomness / Unique sink orientation

Randomized Algorithms An Introduction through Unique Sink Orientations Lecture Notes Bernd G¨artner, ETH Z¨urich February 13, 2004

Add to Reading List

Source URL: people.inf.ethz.ch

Language: English - Date: 2016-06-20 11:55:28
UPDATE