Sciweavers

978 search results - page 7 / 196
» Knowledge, Probability, and Adversaries
Sort
View
AAAI
2004
13 years 8 months ago
Synthetic Adversaries for Urban Combat Training
This paper describes requirements for synthetic adversaries for urban combat training and MOUTBots, a prototype application. The MOUTBots use a commercial computer game to define,...
Robert E. Wray, John E. Laird, Andrew Nuxoll, Devv...
STOC
2007
ACM
98views Algorithms» more  STOC 2007»
14 years 7 months ago
Negative weights make adversaries stronger
The quantum adversary method is one of the most successful techniques for proving lower bounds on quantum query complexity. It gives optimal lower bounds for many problems, has ap...
Peter Høyer, Troy Lee, Robert Spalek
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
14 years 21 days ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
IWSEC
2010
Springer
13 years 5 months ago
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
Margus Niitsoo
JSAC
2010
86views more  JSAC 2010»
13 years 5 months ago
A randomized countermeasure against parasitic adversaries in wireless sensor networks
—Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are hard to defend against. In this paper, we first identify a typical attacker, c...
Panagiotis Papadimitratos, Jun Luo, Jean-Pierre Hu...