A leakage-resilient cryptosystem remains secure even if arbitrary, but bounded, information about the secret key (or possibly other internal state information) is leaked to an adv...
Abstract— This paper proposes a novel mechanism for protecting sensitive information inside big organisations against unauthorised disclosure by insider or outsider adversaries. ...
Multi-robot learning faces all of the challenges of robot learning with all of the challenges of multiagent learning. There has been a great deal of recent research on multiagent ...
We discuss how the interaction between spam senders and e-mail users can be modelled as a two-player adversary game. We show how the resulting model can be used to predict the str...
Ion Androutsopoulos, Evangelos F. Magirou, Dimitri...
This paper describes requirements for synthetic adversaries for urban combat training and MOUTBots, a prototype application. The MOUTBots use a commercial computer game to define,...
Robert E. Wray, John E. Laird, Andrew Nuxoll, Devv...