Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,217,384 papers from all fields of science
Search
Sign In
Create Free Account
Adversary (cryptography)
Known as:
Adversary
In cryptography, an adversary (rarely opponent, enemy) is a malicious entity whose aim is to prevent the users of the cryptosystem from achieving…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
31 relations
Alice and Bob
Authentication
Block cipher
CHAOS
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Programming the robot in tasks of inspection and interception
G. Alferov
,
O. Malafeyev
,
A. Maltseva
International Conference on Mechanics - Seventh…
2015
Corpus ID: 19932736
A pursuer ship - interceptor equipped with sonar, searches adversary submarine and it detected a submarine's periscope at a sea…
Expand
Highly Cited
2011
Highly Cited
2011
RFID Distance Bounding Protocols with Mixed Challenges
Chong Hee Kim
,
G. Avoine
IEEE Transactions on Wireless Communications
2011
Corpus ID: 1697226
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud, and terrorist fraud. Among them…
Expand
Highly Cited
2010
Highly Cited
2010
Preventing multi-query attack in location-based services
N. Talukder
,
Sheikh Iqbal Ahamed
Wireless Network Security
2010
Corpus ID: 7110206
Despite increasing popularity, Location-based Services (LBS) (e.g., searching nearby points-of-interest on map) on mobile…
Expand
Highly Cited
2008
Highly Cited
2008
Location privacy and anonymity preserving routing for wireless sensor networks
Alireza A. Nezhad
,
A. Miri
,
D. Makrakis
Comput. Networks
2008
Corpus ID: 27638042
Highly Cited
2005
Highly Cited
2005
Information assurance in wireless sensor networks
S. Olariu
,
Qingwen Xu
IEEE International Parallel and Distributed…
2005
Corpus ID: 16232114
Networking unattended wireless sensors is expected to have significant impact on the efficiency of a large array of military and…
Expand
Highly Cited
2004
Highly Cited
2004
A steganographic scheme for secure communications based on the chaos and euler Theorem
D. Lou
,
Chia-Hung Sung
IEEE transactions on multimedia
2004
Corpus ID: 12770859
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence…
Expand
Highly Cited
2004
Highly Cited
2004
A study of procurement behaviour in small firms
B. Morrissey
,
L. Pittaway
2004
Corpus ID: 18481435
This paper analyses buyer‐supplier relationships from the perspective of small and medium‐sized enterprises (SMEs). Preliminary…
Expand
1995
1995
Multiple Time Scale Regulation and Worst Case Processes for ATM Network Control
D. Mitra
,
J. Morrison
Proceedings of 34th IEEE Conference on Decision…
1995
Corpus ID: 15503786
We consider the composite of several conventional Leaky Bucket traffic regulators, one for each time scale. Over longer time…
Expand
Highly Cited
1987
Highly Cited
1987
Physical Security for the μABYSS System
Steve H. Weingart
IEEE Symposium on Security and Privacy
1987
Corpus ID: 14824345
Open systems, now common in many small computers, have given the user logical access to all parts of his or her system. At the…
Expand
Highly Cited
1979
Highly Cited
1979
A Counting Approach to Lower Bounds for Selection Problems
Frank Fussenegger
,
H. Gabow
JACM
1979
Corpus ID: 7868196
Lower bounds are derived on the number of comparisons to solve several well-known selection problems Among the problems are…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE