Adversary

Results: 851



#Item
41United States bankruptcy law / Adversary proceeding in bankruptcy / United States bankruptcy court / Matter / Bankruptcy

INSTRUCTIONS FOR APPENDIX A

Add to Reading List

Source URL: www.abcworld.org

Language: English - Date: 2008-08-27 13:06:55
42Online algorithms / Analysis of algorithms / Theoretical computer science / Metrical task system / K-server problem / Adversary model / Algorithm / Competitive analysis / Randomized algorithm / Approximation algorithm / Computational learning theory

Online Algorithms Susanne Albers Stefano Leonardiy Over the past twelve years, online algorithms have received considerable research interest. Online

Add to Reading List

Source URL: www14.in.tum.de

Language: English - Date: 2013-11-25 11:05:41
43

Circular chosen-ciphertext security with compact ciphertexts Dennis Hofheinz∗ January 19, 2013 Abstract A key-dependent message (KDM) secure encryption scheme is secure even if an adversary

Add to Reading List

Source URL: www.kjdf.de

Language: English - Date: 2014-06-10 05:37:34
    44

    Exploitation as an Inference Problem David Cock NICTA and University of New South Wales ABSTRACT In this position paper, we suggest that an adversary seeking to exploit a side channel should be view

    Add to Reading List

    Source URL: research.davidcock.fastmail.fm

    Language: English - Date: 2014-11-20 18:54:15
      45Analysis of algorithms / Online algorithms / Adversary model

      Adversary Gain vs. Defender Loss in Quantified Information Flow Piotr Mardziel,† Mário S. Alvim,‡ and Michael Hicks,† † University of Maryland, College Park ‡ Universidade Federal de Minas Gerais

      Add to Reading List

      Source URL: software.imdea.org

      Language: English - Date: 2014-07-17 09:25:53
      46

      MACs and Authenticated Encryption February 7, 2013 Introduction Information Security consists of: – Confidentiality (achieved through encryption, aims to prevent adversary from reading a

      Add to Reading List

      Source URL: users.encs.concordia.ca

      Language: English - Date: 2013-08-05 10:54:57
        47Online algorithms / Analysis of algorithms / Computer science / Mathematics / Applied mathematics / Competitive analysis / List update problem / Algorithm / Permutation / Adversary model / Homography

        Optimal Projective Algorithms for the List Update Problem Christoph Amb¨uhl1 , Bernd G¨artner1 , and Bernhard von Stengel2 1 Institute for Theoretical Computer Science, ETH Z¨urich, 8092 Z¨urich, Switzerland.

        Add to Reading List

        Source URL: www.maths.lse.ac.uk

        Language: English - Date: 2010-01-11 12:21:35
        48Game theory / Pursuit-evasion / Strategy / Nash equilibrium / Search algorithm / Flow network / Directed graph / Best response / Algorithm

        Transiting Areas Patrolled by a Mobile Adversary Ondˇrej Vanˇek, Branislav Boˇsansk´y, Michal Jakob and Michal Pˇechouˇcek which it chooses a closed-walk starting and ending in a given location in the area, termed

        Add to Reading List

        Source URL: game.itu.dk

        Language: English - Date: 2010-08-10 12:41:00
        49Online algorithms / Analysis of algorithms / List update problem / Competitive analysis / Adversary model / Algorithm / K-server problem

        Theoretical Computer Science–16 www.elsevier.com/locate/tcs A new lower bound for the list update problem in the partial cost model

        Add to Reading List

        Source URL: www.maths.lse.ac.uk

        Language: English - Date: 2002-11-18 18:10:24
        50

        Byzantine Agreement with a Rational Adversary Adam Groce, Jonathan Katz? , Aishwarya Thiruvengadam, and Vassilis Zikas?? Department of Computer Science, University of Maryland {agroce,jkatz,aish,vzikas}@cs.umd.edu Abstr

        Add to Reading List

        Source URL: people.inf.ethz.ch

        Language: English - Date: 2012-07-09 12:52:40
          UPDATE