Adversary model

Known as: Adversarial model, Adversary, Adversary (online algorithm) 
In computer science, an online algorithm measures its competitiveness against different adversary models. For deterministic algorithms, the adversary… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
In practice, there are often explicit constraints on what representations or decisions are acceptable in an application of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2016
2016
Recent applications of Stackelberg Security Games (SSG), from wildlife crime to urban crime, have employed machine learning tools… (More)
  • table 1
  • figure 1
  • table 2
  • figure 2
Is this relevant?
2016
2016
Android forensics is one of the most studied topics in the mobile forensics literature, partly due to the popularity of Android… (More)
  • figure 1
  • figure 2
  • table 4
  • table 6
  • table 10
Is this relevant?
2015
2015
In this paper, we propose an adversary model to facilitate forensic investigations of mobile devices (e.g. Android, iOS and… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2013
Highly Cited
2013
We present the first analysis of the popular Tor anonymity network that indicates the security of typical users against… (More)
  • table 1
  • table 2
  • table 3
  • figure 1
  • figure 2
Is this relevant?
2012
2012
Traditionally, cryptographers assume a “worst-case” adversary who can act arbitrarily. More recently, they have begun to consider… (More)
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Recently, Aumann and Lindell introduced a new realistic security model for secure computation, namely, security against covert… (More)
Is this relevant?
2007
2007
In ACISP 2006, Peng et al proposed a novel range test technique, which tests whether the integer encrypted in a ciphertext is in… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Radio Frequency Identification (RFID) systems aim to identify objects in open environments with neither physical nor visual… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Developing secure-critical systems is difficult and there are many well-known examples of security weaknesses exploited in… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?