Sciweavers

3484 search results - page 5 / 697
» Adversarial Web Search
Sort
View
IJACT
2008
136views more  IJACT 2008»
13 years 9 months ago
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
: In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation betw...
Mike Burmester, Breno de Medeiros, Rossana Motta
CEC
2010
IEEE
13 years 1 months ago
A hybrid genetic algorithm for rescue path planning in uncertain adversarial environment
— Efficient vehicle path planning in hostile environment to carry out rescue or tactical logistic missions remains very challenging. Most approaches reported so far relies on key...
Jean Berger, Khaled Jabeur, Abdeslem Boukhtouta, A...
SP
2009
IEEE
106views Security Privacy» more  SP 2009»
14 years 4 months ago
Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments
– HTTPS is designed to provide secure web communications over insecure networks. The protocol itself has been rigorously designed and evaluated by assuming the network as an adve...
Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang
IJRR
2010
135views more  IJRR 2010»
13 years 7 months ago
On the Design and Use of a Micro Air Vehicle to Track and Avoid Adversaries
The MAV '08 competition focused on the problem of using air and ground vehicles to locate and rescue hostages being held in a remote building. To execute this mission, a numbe...
Ruijie He, Abraham Bachrach, Michael Achtelik, Alb...
IPM
2006
184views more  IPM 2006»
13 years 9 months ago
How are we searching the World Wide Web? A comparison of nine search engine transaction logs
The Web and especially major Web search engines are essential tools in the quest to locate online information for many people. This paper reports results from research that examin...
Bernard J. Jansen, Amanda Spink