Sciweavers

973 search results - page 39 / 195
» Arguing Using Opponent Models
Sort
View
TIP
2010
107views more  TIP 2010»
13 years 2 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
CSFW
2004
IEEE
13 years 11 months ago
Symbolic Model Checking the Knowledge of the Dining Cryptographers
This paper describes how symbolic techniques (in particular, OBDD's) may be used to to implement an algorithm for model checking specifications in the logic of knowledge for ...
Ron van der Meyden, Kaile Su
EUROCRYPT
2000
Springer
13 years 11 months ago
Efficient Concurrent Zero-Knowledge in the Auxiliary String Model
We show that if any one-way function exists, then 3-round concurrent zero-knowledge arguments for all NP problems can be built in a model where a short auxiliary string with a pres...
Ivan Damgård
ESCIENCE
2005
IEEE
14 years 1 months ago
The Supplier Model for Legacy Applications in a Grid
The use of web services as the basis for grid middleware has allowed scientists to wrap legacy applications as services in order to provide their capabilities to grid users. Howev...
Jonathan Giddy, Ian J. Grimstead, Jason Jones
DEON
2010
Springer
13 years 10 months ago
A Logical Model of Private International Law
We provide a logical analysis of private international law, the body of law establishing when courts of a country should decide a case (jurisdiction) and what legal system they sho...
Phan Minh Dung, Giovanni Sartor