Sciweavers

784 search results - page 18 / 157
» An underlying model for defeat mechanisms
Sort
View
TMC
2012
11 years 9 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
PET
2004
Springer
14 years 21 days ago
On Flow Correlation Attacks and Countermeasures in Mix Networks
In this paper, we address issues related to flow correlation attacks and the corresponding countermeasures in mix networks. Mixes have been used in many anonymous communication s...
Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati,...
EMSOFT
2011
Springer
12 years 7 months ago
From boolean to quantitative synthesis
Motivated by improvements in constraint-solving technology and by the increase of routinely available computational power, partial-program synthesis is emerging as an effective a...
Pavol Cerný, Thomas A. Henzinger
CEAS
2006
Springer
13 years 11 months ago
Fast Uncertainty Sampling for Labeling Large E-mail Corpora
One of the biggest challenges in building effective anti-spam solutions is designing systems to defend against the everevolving bag of tricks spammers use to defeat them. Because ...
Richard Segal, Ted Markowitz, William Arnold
AAMAS
2002
Springer
13 years 7 months ago
On the Natural Selection of Market Choice
An evolutionary approach to the problem of economic mechanism choice is presented. It demonstrates the power that a single participant has on the choice of a preferred market mecha...
Aviv Bergman, Moshe Tennenholtz