Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,136,482 papers from all fields of science
Search
Sign In
Create Free Account
Adversary model
Known as:
Adversarial model
, Adversary
, Adversary (online algorithm)
In computer science, an online algorithm measures its competitiveness against different adversary models. For deterministic algorithms, the adversary…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Broader (1)
Analysis of algorithms
Competitive analysis (online algorithm)
Computer science
K-server problem
List update problem
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Partially Specified Channels: The TLS 1.3 Record Layer without Elision
Christopher Patton
,
Thomas Shrimpton
IACR Cryptology ePrint Archive
2018
Corpus ID: 51603447
We advance the study of secure stream-based channels (Fischlin et al., CRYPTO '15) by considering the multiplexing of many data…
Expand
2017
2017
Random Permutation Online Isotonic Regression
W. Kotłowski
,
Wouter M. Koolen
,
Alan Malek
Neural Information Processing Systems
2017
Corpus ID: 41735099
We revisit isotonic regression on linear orders, the problem of fitting monotonic functions to best explain the data, in an…
Expand
2017
2017
An ECC‐based authenticated group key exchange protocol in IBE framework
D. Gupta
,
Gautam Biswas
International Journal of Communication Systems
2017
Corpus ID: 28683836
With the rapid demand for various increasing applications, the internet users require a common secret key to communicate among a…
Expand
2016
2016
Scalable Privacy-Preserving Linking of Multiple Databases Using Counting Bloom Filters
Dinusha Vatsalan
,
P. Christen
,
E. Rahm
IEEE 16th International Conference on Data Mining…
2016
Corpus ID: 14121001
The integration, mining, and analysis of person-specific data can provide enormous opportunities for organizations, governments…
Expand
2016
2016
International Commissions of Inquiry and the North Sea Incident: A Model for a MH17 Tribunal?
J. Lemnitzer
2016
Corpus ID: 151522541
After spending more than a century on the fringes of international legal discourse, international commissions of inquiry have…
Expand
Highly Cited
2015
Highly Cited
2015
Exfiltrating data from Android devices
Quang Do
,
Ben Martini
,
Kim-Kwang Raymond Choo
Computers & security
2015
Corpus ID: 46515645
2015
2015
Multi-user Searchable Encryption in the Cloud
Cédric Van Rompay
,
R. Molva
,
Melek Önen
Information Security Conference
2015
Corpus ID: 17915694
While Searchable Encryption SE has been widely studied, adapting it to the multi-user setting whereby many users can upload…
Expand
2013
2013
Client-Controlled Cryptography-as-a-Service in the Cloud
Sören Bleikertz
,
Sven Bugiel
,
Hugo Ideler
,
S. Nürnberger
,
A. Sadeghi
International Conference on Applied Cryptography…
2013
Corpus ID: 11950983
Today, a serious concern about cloud computing is the protection of clients' data and computations against various attacks from…
Expand
2011
2011
Optimal schemes for robust web extraction
Aditya G. Parameswaran
,
Nilesh N. Dalvi
,
H. Garcia-Molina
,
R. Rastogi
Proceedings of the VLDB Endowment
2011
Corpus ID: 3246806
In this paper, we consider the problem of constructing wrappers for web information extraction that are robust to changes in…
Expand
2007
2007
Revenue in Truly Combinatorial Auctions and Adversarial Mechanism Design
S. Micali
,
Paul Valiant
2007
Corpus ID: 17868444
Little is known about generating revenue in unrestricted combinatorial auctions. (In particular, the VCG mechanism has no revenue…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE