Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,286,837 papers from all fields of science
Search
Sign In
Create Free Account
Computationally bounded adversary
In information theory, the computationally bounded adversary problem is a different way of looking at the problem of sending data over a noisy…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Adversary (cryptography)
Concrete security
Information theory
List decoding
Expand
Broader (2)
Coding theory
Computational complexity theory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A Simple Obfuscation Scheme for Pattern-Matching with Wildcards
Allison Bishop
,
Lucas Kowalczyk
,
T. Malkin
,
Valerio Pastro
,
Mariana Raykova
,
Kevin Shi
IACR Cryptology ePrint Archive
2018
Corpus ID: 34254599
We give a simple and efficient method for obfuscating pattern matching with wildcards. In other words, we construct a way to…
Expand
2014
2014
Reliable broadcast with respect to topology knowledge
Aris Pagourtzis
,
Giorgos Panagiotakos
,
Dimitris Sakavalas
Distributed computing
2014
Corpus ID: 18580427
We study the Reliable Broadcast problem in incomplete networks against a Byzantine adversary. We examine the problem under the…
Expand
2013
2013
Constant Query Locally Decodable Codes against Computationally Bounded Adversary
Rishiraj Bhattacharyya
,
Sourav Chakraborty
2013
Corpus ID: 8761070
Designing efficient Locally Decodable Codes with constant query complexity has been a central open problem in theoretical…
Expand
Highly Cited
2009
Highly Cited
2009
Providing Privacy through Plausibly Deniable Search
Mummoorthy Murugesan
,
Chris Clifton
SDM
2009
Corpus ID: 18051581
Query-based web search is an integral part of many people’s daily activities. Most do not realize that their search history can…
Expand
2009
2009
Basic qualitative properties of Petri nets with multi-guarded transitions
J. Júlvez
American Control Conference
2009
Corpus ID: 31408384
In many discrete event dynamic systems, there exist tasks that can start performing before every input data is available. A…
Expand
Highly Cited
2008
Highly Cited
2008
Fast asynchronous byzantine agreement and leader election with full information
B. M. Kapron
,
D. Kempe
,
Valerie King
,
Jared Saia
,
Vishal Sanwalani
ACM-SIAM Symposium on Discrete Algorithms
2008
Corpus ID: 326620
We resolve two long-standing open problems in distributed computation by describing polylogarithmic protocols for Byzantine…
Expand
2007
2007
Optimal Quantum Adversary Lower Bounds for Ordered Search
Andrew M. Childs
,
Troy Lee
International Colloquium on Automata, Languages…
2007
Corpus ID: 11616767
The goal of the ordered search problem is to find a particular item in an ordered list of nitems. Using the adversary method…
Expand
Highly Cited
2007
Highly Cited
2007
Limiting Sybil Attacks in Structured P2P Networks
H. Rowaihy
,
W. Enck
,
P. Mcdaniel
,
T. L. Porta
IEEE INFOCOM - 26th IEEE International…
2007
Corpus ID: 8453118
One practical limitation of structured peer-to-peer (P2P) networks is that they are frequently subject to Sybil attacks…
Expand
Highly Cited
2004
Highly Cited
2004
Nonclairvoyant scheduling to minimize the total flow time on single and parallel machines
L. Becchetti
,
S. Leonardi
JACM
2004
Corpus ID: 1229899
Scheduling a sequence of jobs released over time when the processing time of a job is only known at its completion is a classical…
Expand
2001
2001
Equivalences among aggregate queries with negation
Sara Cohen
,
W. Nutt
,
Y. Sagiv
ACM SIGACT-SIGMOD-SIGART Symposium on Principles…
2001
Corpus ID: 875070
Query equivalence is investigated for disjunctive aggregate queries with negated subgoals, constants and comparisons. A full…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE