Sciweavers

179 search results - page 12 / 36
» Adversarial Leakage in Games
Sort
View
ACNS
2010
Springer
185views Cryptology» more  ACNS 2010»
14 years 2 months ago
Adaptive Chosen-Message Side-Channel Attacks
Most side-channel attacks that have been published in the open literature assume known- or chosen-message adversarial scenarios. In this paper, we analyze the increase of the attac...
Nicolas Veyrat-Charvillon, François-Xavier ...
ATAL
2007
Springer
14 years 4 months ago
An adversarial environment model for bounded rational agents in zero-sum interactions
Multiagent environments are often not cooperative nor collaborative; in many cases, agents have conflicting interests, leading to adversarial interactions. This paper presents a ...
Inon Zuckerman, Sarit Kraus, Jeffrey S. Rosenschei...
SACRYPT
2004
Springer
143views Cryptology» more  SACRYPT 2004»
14 years 3 months ago
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes
Abstract. This paper formalizes the security adversarial games for online symmetric cryptosystems in a unified framework for deterministic and probabilistic encryption schemes. On...
Pierre-Alain Fouque, Antoine Joux, Guillaume Poupa...
ATAL
2010
Springer
13 years 11 months ago
A graph-theoretic approach to protect static and moving targets from adversaries
The static asset protection problem (SAP) in a road network is that of allocating resources to protect vertices, given any possible behavior by an adversary determined to attack t...
John P. Dickerson, Gerardo I. Simari, V. S. Subrah...
ROBOCUP
2001
Springer
96views Robotics» more  ROBOCUP 2001»
14 years 2 months ago
Strategy Learning for a Team in Adversary Environments
Team strategy acquisition is one of the most important issues of multiagent systems, especially in an adversary environment. RoboCup has been providing such an environment for AI a...
Yasutake Takahashi, Takashi Tamura, Minoru Asada