Sciweavers

179 search results - page 7 / 36
» Adversarial Leakage in Games
Sort
View
ASIACRYPT
2009
Springer
14 years 4 months ago
Signature Schemes with Bounded Leakage Resilience
A leakage-resilient cryptosystem remains secure even if arbitrary, but bounded, information about the secret key (or possibly other internal state information) is leaked to an adv...
Jonathan Katz, Vinod Vaikuntanathan
SECURWARE
2008
IEEE
14 years 4 months ago
Preventing Insider Information Leakage for Enterprises
Abstract— This paper proposes a novel mechanism for protecting sensitive information inside big organisations against unauthorised disclosure by insider or outsider adversaries. ...
Imad M. Abbadi, Muntaha Alawneh
IJCAI
2003
13 years 11 months ago
Simultaneous Adversarial Multi-Robot Learning
Multi-robot learning faces all of the challenges of robot learning with all of the challenges of multiagent learning. There has been a great deal of recent research on multiagent ...
Michael H. Bowling, Manuela M. Veloso
CEAS
2005
Springer
14 years 3 months ago
A Game Theoretic Model of Spam E-Mailing
We discuss how the interaction between spam senders and e-mail users can be modelled as a two-player adversary game. We show how the resulting model can be used to predict the str...
Ion Androutsopoulos, Evangelos F. Magirou, Dimitri...
AAAI
2004
13 years 11 months ago
Synthetic Adversaries for Urban Combat Training
This paper describes requirements for synthetic adversaries for urban combat training and MOUTBots, a prototype application. The MOUTBots use a commercial computer game to define,...
Robert E. Wray, John E. Laird, Andrew Nuxoll, Devv...