Adversary model

Results: 85



#Item
31Trust-based Anonymous Communication: Adversary Models and Routing Algorithms ∗ Aaron Johnson

Trust-based Anonymous Communication: Adversary Models and Routing Algorithms ∗ Aaron Johnson

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2011-09-03 19:34:39
32Online Assignment of Heterogeneous Tasks in Crowdsourcing Markets Sepehr Assadi, Justin Hsu, Shahin Jabbari Department of Computer and Information Science, University of Pennsylvania {sassadi, justhsu, jabbari}@cis.upenn

Online Assignment of Heterogeneous Tasks in Crowdsourcing Markets Sepehr Assadi, Justin Hsu, Shahin Jabbari Department of Computer and Information Science, University of Pennsylvania {sassadi, justhsu, jabbari}@cis.upenn

Add to Reading List

Source URL: justinh.su

Language: English - Date: 2015-05-13 13:11:34
33Constant-Round Coin-Tossing With a Man in the Middle or Realizing the Shared Random String Model Boaz Barak∗ May 19, 2008

Constant-Round Coin-Tossing With a Man in the Middle or Realizing the Shared Random String Model Boaz Barak∗ May 19, 2008

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:51:33
34

PDF Document

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-12-28 08:41:16
35NUMBERS, FACTS AND TRENDS SHAPING THE WORLD  FOR RELEASE MARCH 25, 2014 FOR FURTHER INFORMATION ON THIS REPORT:

NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE MARCH 25, 2014 FOR FURTHER INFORMATION ON THIS REPORT:

Add to Reading List

Source URL: www.people-press.org

Language: English - Date: 2015-04-06 10:29:06
36Quantum Adversary (Upper) Bound

Quantum Adversary (Upper) Bound

Add to Reading List

Source URL: cjtcs.cs.uchicago.edu

Language: English - Date: 2013-04-06 19:44:11
37Journal of Artificial Intelligence Research367  Submitted 1/14; published 6/14 Game-Theoretic Security Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System

Journal of Artificial Intelligence Research367 Submitted 1/14; published 6/14 Game-Theoretic Security Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System

Add to Reading List

Source URL: www.jair.org

Language: English - Date: 2014-06-19 15:08:32
38Chapter 6: Randomization  Quotation Algorithmic Adventures From Knowledge to Magic

Chapter 6: Randomization Quotation Algorithmic Adventures From Knowledge to Magic

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2011-10-24 15:11:44
39A preliminary version appears in ISC 2009, Lecture Notes in Computer Science, Springer-Verlag, 2009. This version is dated December 18, 2009. Security Analysis of the PACE Key-Agreement Protocol Jens Bender1

A preliminary version appears in ISC 2009, Lecture Notes in Computer Science, Springer-Verlag, 2009. This version is dated December 18, 2009. Security Analysis of the PACE Key-Agreement Protocol Jens Bender1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-18 06:37:52
40On Concurrently Secure Computation in the Multiple Ideal Query Model∗ Abhishek Jain‡ Vipul Goyal†

On Concurrently Secure Computation in the Multiple Ideal Query Model∗ Abhishek Jain‡ Vipul Goyal†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-07 10:35:40