Sciweavers

179 search results - page 1 / 36
» Adversarial Leakage in Games
Sort
View
ICS
2010
Tsinghua U.
14 years 4 months ago
Adversarial Leakage in Games
Noga Alon, Yuval Emek, Michal Feldman, Moshe Tenne...
IJISEC
2008
119views more  IJISEC 2008»
13 years 6 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
VLDB
2005
ACM
135views Database» more  VLDB 2005»
14 years 8 days ago
Distributed Privacy Preserving Information Sharing
In this paper, we address issues related to sharing information in a distributed system consisting of autonomous entities, each of which holds a private database. Semi-honest beha...
Nan Zhang 0004, Wei Zhao
IACR
2011
94views more  IACR 2011»
12 years 6 months ago
After-the-Fact Leakage in Public-Key Encryption
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but onl...
Shai Halevi, Huijia Lin
IJNSEC
2006
80views more  IJNSEC 2006»
13 years 6 months ago
Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices
Side channel analysis is a technique that enables the adversary to benefit from information leakages occurring due to the implementation of encryption algorithms on
Dimitrios L. Delivasilis, Sokratis K. Katsikas