Sciweavers

179 search results - page 31 / 36
» Adversarial Leakage in Games
Sort
View
ICMCS
2009
IEEE
106views Multimedia» more  ICMCS 2009»
13 years 7 months ago
Modeling and analysis of content identification
Content fingerprinting provides a compact content-based representation of a multimedia document. An important application of fingerprinting is the identification of modified copie...
Avinash L. Varna, Min Wu
CCS
2009
ACM
14 years 4 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
AIIDE
2009
13 years 11 months ago
Improving Offensive Performance Through Opponent Modeling
Although in theory opponent modeling can be useful in any adversarial domain, in practice it is both difficult to do accurately and to use effectively to improve game play. In thi...
Kennard Laviers, Gita Sukthankar, David W. Aha, Ma...
ESORICS
2009
Springer
14 years 4 months ago
A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem
Abstract. Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy...
Ileana Buhan, Jeroen Breebaart, Jorge Guajardo, Ko...
ICSE
2000
IEEE-ACM
14 years 1 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine