Adversary

Results: 851



#Item
11Trust-based Anonymous Communication: Adversary Models and Routing Algorithms ∗ Aaron Johnson

Trust-based Anonymous Communication: Adversary Models and Routing Algorithms ∗ Aaron Johnson

Add to Reading List

Source URL: www.nrl.navy.mil

- Date: 2013-04-25 12:23:44
    12Modeling the adversary to evaluate password strength with limited samples Saranga Komanduri CMU-ISRFebruary 2016

    Modeling the adversary to evaluate password strength with limited samples Saranga Komanduri CMU-ISRFebruary 2016

    Add to Reading List

    Source URL: reports-archive.adm.cs.cmu.edu

    - Date: 2016-02-15 14:49:04
      13Practical Robust Communication in DHTs Tolerating a Byzantine Adversary Maxwell Young Aniket Kate Ian Goldberg Martin Karsten

      Practical Robust Communication in DHTs Tolerating a Byzantine Adversary Maxwell Young Aniket Kate Ian Goldberg Martin Karsten

      Add to Reading List

      Source URL: cacr.uwaterloo.ca

      - Date: 2011-07-10 02:35:14
        14Project Heisenberg Cloud: Cross-Cloud Adversary Analytics RAPID7 LABS | NOVEMBER 2016 What is Heisenberg Cloud? Heisenberg Cloud is a Rapid7 Labs research project with a singular purpose:

        Project Heisenberg Cloud: Cross-Cloud Adversary Analytics RAPID7 LABS | NOVEMBER 2016 What is Heisenberg Cloud? Heisenberg Cloud is a Rapid7 Labs research project with a singular purpose:

        Add to Reading List

        Source URL: information.rapid7.com

        - Date: 2016-12-12 23:13:47
          15Evaluation of Privacy Preserving Algorithms Using Traffic Knowledge Based Adversary Models Zhanbo Sun, Bin Zan*, Jeff (Xuegang) Ban, Marco Gruteser* and Peng Hao Rensselaer Polytechnic Institute 110 8th St. Troy, NY 1218

          Evaluation of Privacy Preserving Algorithms Using Traffic Knowledge Based Adversary Models Zhanbo Sun, Bin Zan*, Jeff (Xuegang) Ban, Marco Gruteser* and Peng Hao Rensselaer Polytechnic Institute 110 8th St. Troy, NY 1218

          Add to Reading List

          Source URL: www.winlab.rutgers.edu

          - Date: 2011-10-03 13:36:11
            16Competitive Online Algorithms Susanne Albers Overview  arrive one by one and must be scheduled immediately

            Competitive Online Algorithms Susanne Albers Overview arrive one by one and must be scheduled immediately

            Add to Reading List

            Source URL: www14.in.tum.de

            Language: English - Date: 2013-11-25 11:09:17
            17	INSTRUCTIONS FOR APPENDIX A

            INSTRUCTIONS FOR APPENDIX A

            Add to Reading List

            Source URL: www.abcworld.org

            Language: English - Date: 2010-03-22 12:20:36
            18Charles University in Prague Faculty of Mathematics and Physics DOCTORAL THESIS  Jan Bul´anek

            Charles University in Prague Faculty of Mathematics and Physics DOCTORAL THESIS Jan Bul´anek

            Add to Reading List

            Source URL: iuuk.mff.cuni.cz

            Language: English - Date: 2014-07-29 07:02:19
            19Volume 7, Number 2  Fall 2008 Baltimore’s War Turned Adversary Into an Ally

            Volume 7, Number 2 Fall 2008 Baltimore’s War Turned Adversary Into an Ally

            Add to Reading List

            Source URL: www.historicbaltimore.org

            Language: English - Date: 2014-03-20 07:32:52
            20Online Algorithms: A Study of Graph-Theoretic Concepts Susanne Albers Max-Planck-Institut fur Informatik, Im Stadtwald, 66123 Saarbrucken, Germany. , http://www.mpi-sb.mpg.de/~ albers/

            Online Algorithms: A Study of Graph-Theoretic Concepts Susanne Albers Max-Planck-Institut fur Informatik, Im Stadtwald, 66123 Saarbrucken, Germany. , http://www.mpi-sb.mpg.de/~ albers/

            Add to Reading List

            Source URL: www14.in.tum.de

            Language: English - Date: 2013-11-25 11:05:02