Sciweavers

179 search results - page 6 / 36
» Adversarial Leakage in Games
Sort
View
CRYPTO
1993
Springer
130views Cryptology» more  CRYPTO 1993»
14 years 1 months ago
Discreet Solitary Games
Cryptographic techniques have been used intensively in the past to show how to play multiparty games in an adversarial scenario. We now investigate the cryptographic power of a dec...
Claude Crépeau, Joe Kilian
DBSEC
2008
129views Database» more  DBSEC 2008»
13 years 11 months ago
Sharing but Protecting Content Against Internal Leakage for Organisations
Abstract. Dishonest employees, who have privileges to obtain corporate critical information and access internal resources, cause the problem of internal leakage. Employees, who hav...
Muntaha Alawneh, Imad M. Abbadi
ICML
2003
IEEE
14 years 10 months ago
Planning in the Presence of Cost Functions Controlled by an Adversary
We investigate methods for planning in a Markov Decision Process where the cost function is chosen by an adversary after we fix our policy. As a running example, we consider a rob...
H. Brendan McMahan, Geoffrey J. Gordon, Avrim Blum
ECAI
2008
Springer
13 years 11 months ago
An Empirical Investigation of the Adversarial Activity Model
Multiagent research provides an extensive literature on formal Belief-Desire-Intention (BDI) based models describing the notions of teamwork and cooperation, but adversarial and c...
Inon Zuckerman, Sarit Kraus, Jeffrey S. Rosenschei...
GAMESEC
2010
150views Game Theory» more  GAMESEC 2010»
13 years 7 months ago
Adversarial Control in a Delay Tolerant Network
We consider a multi-criteria control problem that arises in a delay tolerant network with two adversarial controllers: the source and the jammer. The source's objective is to ...
Eitan Altman, Tamer Basar, Veeraruna Kavitha