Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,731,756 papers from all fields of science
Search
Sign In
Create Free Account
Adversary (cryptography)
Known as:
Adversary
In cryptography, an adversary (rarely opponent, enemy) is a malicious entity whose aim is to prevent the users of the cryptosystem from achieving…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
31 relations
Alice and Bob
Authentication
Block cipher
CHAOS
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Programming the robot in tasks of inspection and interception
G. Alferov
,
O. Malafeyev
,
A. Maltseva
International Conference on Mechanics - Seventh…
2015
Corpus ID: 19932736
A pursuer ship - interceptor equipped with sonar, searches adversary submarine and it detected a submarine's periscope at a sea…
Expand
Highly Cited
2012
Highly Cited
2012
Security improvement on an anonymous key agreement protocol based on chaotic maps
Kaiping Xue
,
P. Hong
2012
Corpus ID: 62596927
Highly Cited
2011
Highly Cited
2011
After-the-Fact Leakage in Public-Key Encryption
S. Halevi
,
Huijia Lin
IACR Cryptology ePrint Archive
2011
Corpus ID: 17573294
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains…
Expand
Highly Cited
2010
Highly Cited
2010
Security issues and challenges of Vehicular Ad Hoc Networks (VANET)
G. Samara
,
W. Al-Salihy
,
R. Sures
International Conference on New Trends in…
2010
Corpus ID: 6847173
The security of Vehicular Ad Hoc Networks (VANET) has mostly directed the attention of today research efforts, while…
Expand
Highly Cited
2008
Highly Cited
2008
Modeling node capture attacks in wireless sensor networks
Patrick Tague
,
R. Poovendran
46th Annual Allerton Conference on Communication…
2008
Corpus ID: 15586218
We formalize a model for node capture attacks in which an adversary collects information about the network via eavesdropping on…
Expand
Review
2006
Review
2006
The role of behavioral research and profiling in malicious cyber insider investigations
E. Shaw
Digital Investigation. The International Journal…
2006
Corpus ID: 30624967
Highly Cited
2005
Highly Cited
2005
Information assurance in wireless sensor networks
S. Olariu
,
Qingwen Xu
IEEE International Parallel and Distributed…
2005
Corpus ID: 16232114
Networking unattended wireless sensors is expected to have significant impact on the efficiency of a large array of military and…
Expand
Highly Cited
2004
Highly Cited
2004
An approach to security and privacy of RFID system for supply chain
Xingxin Gao
,
Zhe Xiang
,
Hao Wang
,
Jun Shen
,
Jian Huang
,
Song Song
IEEE International Conference on E-Commerce…
2004
Corpus ID: 15916460
Radio frequency identification (RFID) is expected to become pervasive and ubiquitous, as it can be embedded into everyday items…
Expand
Highly Cited
2004
Highly Cited
2004
A steganographic scheme for secure communications based on the chaos and euler Theorem
D. Lou
,
Chia-Hung Sung
IEEE transactions on multimedia
2004
Corpus ID: 12770859
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence…
Expand
Highly Cited
2004
Highly Cited
2004
A study of procurement behaviour in small firms
B. Morrissey
,
L. Pittaway
2004
Corpus ID: 18481435
This paper analyses buyer‐supplier relationships from the perspective of small and medium‐sized enterprises (SMEs). Preliminary…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required