Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,279,928 papers from all fields of science
Search
Sign In
Create Free Account
Adversary (cryptography)
Known as:
Adversary
In cryptography, an adversary (rarely opponent, enemy) is a malicious entity whose aim is to prevent the users of the cryptosystem from achieving…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
31 relations
Alice and Bob
Authentication
Block cipher
CHAOS
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Unsupervised Video Summarization with Adversarial LSTM Networks
Behrooz Mahasseni
,
Michael Lam
,
S. Todorovic
Computer Vision and Pattern Recognition
2017
Corpus ID: 6126495
This paper addresses the problem of unsupervised video summarization, formulated as selecting a sparse subset of video frames…
Expand
Highly Cited
2009
Highly Cited
2009
A secure dynamic ID based remote user authentication scheme for multi-server environment
Yi-Pin Liao
,
Shuenn-Shyang Wang
Comput. Stand. Interfaces
2009
Corpus ID: 6346430
Highly Cited
2009
Highly Cited
2009
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
J. Alwen
,
Y. Dodis
,
Daniel Wichs
Annual International Cryptology Conference
2009
Corpus ID: 9812538
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively…
Expand
Highly Cited
2007
Highly Cited
2007
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
M. Conti
,
R. D. Pietro
,
L. Mancini
,
Alessandro Mei
ACM Interational Symposium on Mobile Ad Hoc…
2007
Corpus ID: 5700265
Wireless sensor networks are often deployed in hostile environments, where anadversary can physically capture some of the nodes…
Expand
Highly Cited
2005
Highly Cited
2005
A pairwise key predistribution scheme for wireless sensor networks
Wenliang Du
,
Jing Deng
,
Y. Han
,
P. Varshney
,
Jonathan Katz
,
A. Khalili
TSEC
2005
Corpus ID: 322354
To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent between…
Expand
Highly Cited
2005
Highly Cited
2005
Protecting Location Privacy Through Path Confusion
Baik Hoh
,
M. Gruteser
Security and Privacy in Communication Networks
2005
Corpus ID: 6320842
We present a path perturbation algorithm which can maximize users’ location privacy given a quality of service constraint. This…
Expand
Highly Cited
2004
Highly Cited
2004
Source-location privacy in energy-constrained sensor network routing
Celal Öztürk
,
Yanyong Zhang
,
W. Trappe
ACM Workshop on Security of ad hoc and Sensor…
2004
Corpus ID: 1738277
As sensor-driven applications become increasingly integrated into our lives, issues related to sensor privacy will become…
Expand
Highly Cited
2002
Highly Cited
2002
Shortest‐path network interdiction
E. Israeli
,
R. K. Wood
Networks
2002
Corpus ID: 1380880
We study the problem of interdicting the arcs in a network in order to maximize the shortest s–t path length. “Interdiction” is…
Expand
Highly Cited
1998
Highly Cited
1998
Stochastic Network Interdiction
Kelly J. Cormican
,
D. Morton
,
R. K. Wood
Operational Research
1998
Corpus ID: 14408138
We describe discrete stochastic network interdiction of shortest-path, and maximum-reliability-path, networks. A nested “max–min…
Expand
Highly Cited
1994
Highly Cited
1994
A Secure and Efficient Conference Key Distribution System (Extended Abstract)
M. Burmester
,
Y. Desmedt
International Conference on the Theory and…
1994
Corpus ID: 10144321
We present practical conference key distribution systems based on public keys, which authenticate the users and which are ‘proven…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE