The Adversary

Results: 500



#Item
1The Multiplicative Quantum Adversary ∗ ˇ Robert Spalek

The Multiplicative Quantum Adversary ∗ ˇ Robert Spalek

Add to Reading List

Source URL: www.ucw.cz

Language: English - Date: 2007-08-15 15:10:04
    2Oft Target Tor adversary models that don’t miss the mark 1.  Aaron D. Jaggard

    Oft Target Tor adversary models that don’t miss the mark 1. Aaron D. Jaggard

    Add to Reading List

    Source URL: petsymposium.org

    Language: English - Date: 2017-10-04 16:18:51
      3Egalitarian computing Alex Biryukov University of Luxembourg Abstract In this paper we explore several contexts where an adversary has an upper hand over the defender by using special hardware in an attack. These include

      Egalitarian computing Alex Biryukov University of Luxembourg Abstract In this paper we explore several contexts where an adversary has an upper hand over the defender by using special hardware in an attack. These include

      Add to Reading List

      Source URL: www.cryptolux.org

      Language: English - Date: 2016-06-09 06:04:52
        4Complexity: the silent cyber adversary Robert Gardner  Isis Rose

        Complexity: the silent cyber adversary Robert Gardner Isis Rose

        Add to Reading List

        Source URL: s3.amazonaws.com

        - Date: 2017-09-26 14:02:27
          5Modeling the adversary to evaluate password strength with limited samples Saranga Komanduri CMU-ISRFebruary 2016

          Modeling the adversary to evaluate password strength with limited samples Saranga Komanduri CMU-ISRFebruary 2016

          Add to Reading List

          Source URL: reports-archive.adm.cs.cmu.edu

          - Date: 2016-02-15 14:49:04
            6Volume 7, Number 2  Fall 2008 Baltimore’s War Turned Adversary Into an Ally

            Volume 7, Number 2 Fall 2008 Baltimore’s War Turned Adversary Into an Ally

            Add to Reading List

            Source URL: www.historicbaltimore.org

            Language: English - Date: 2014-03-20 07:32:52
            7Case: Date Filed: Page: 1 of 21

            Case: Date Filed: Page: 1 of 21

            Add to Reading List

            Source URL: www.georgiabankruptcyblog.com

            Language: English - Date: 2016-04-11 11:15:27
            8The 2011 Military Communications Conference - Track 3 - Cyber Security and Network Operations  Multi-node Coordinated Jamming for Location Privacy Protection Sangho Oh

            The 2011 Military Communications Conference - Track 3 - Cyber Security and Network Operations Multi-node Coordinated Jamming for Location Privacy Protection Sangho Oh

            Add to Reading List

            Source URL: www.winlab.rutgers.edu

            Language: English - Date: 2012-01-16 23:23:23
            9The proceedings version of this paper appears in ACM CCSThis is the full version of that paper.  Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

            The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

            Add to Reading List

            Source URL: web.cs.ucdavis.edu

            Language: English - Date: 2007-08-20 03:37:31
            10smb  Doc 90 FiledEntered:33:47 Pg 1 of 39

            smb Doc 90 FiledEntered:33:47 Pg 1 of 39

            Add to Reading List

            Source URL: www.madofftrustee.com

            Language: English - Date: 2016-04-28 13:18:26