Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,322 papers from all fields of science
Search
Sign In
Create Free Account
Computationally bounded adversary
In information theory, the computationally bounded adversary problem is a different way of looking at the problem of sending data over a noisy…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Adversary (cryptography)
Concrete security
Information theory
List decoding
Expand
Broader (2)
Coding theory
Computational complexity theory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
NudgeEntrance: Domestic intervention to change hand washing behaviour
Malay Dhamelia
,
Girish Dalvi
International Conference on Serious Games and…
2018
Corpus ID: 49558950
Hands are primary vectors of many communicable diseases because they come in contact with a variety of surfaces and fluids. Acute…
Expand
2017
2017
A Low-Cost UAV-Based Secure Location Verification Method
Marco Rasori
,
Pericle Perazzo
,
G. Dini
ARES
2017
Corpus ID: 25088979
The capability to verify positions reported by devices is called secure location verification. The majority of the proposed…
Expand
2015
2015
Special issue with selected papers from PODC 2012
A. Panconesi
Distributed computing
2015
Corpus ID: 253973170
2014
2014
Voting with Coarse Beliefs
Samantha Leung
,
Edward Lui
,
R. Pass
Information Technology Convergence and Services
2014
Corpus ID: 2520778
The classic Gibbard-Satterthwaite theorem says that every strategy-proof voting rule with at least three possible candidates must…
Expand
2013
2013
Constant Query Locally Decodable Codes against Computationally Bounded Adversary
Rishiraj Bhattacharyya
,
Sourav Chakraborty
2013
Corpus ID: 8761070
Designing efficient Locally Decodable Codes with constant query complexity has been a central open problem in theoretical…
Expand
2011
2011
Knowledge State Algorithms
W. Bein
,
L. Larmore
,
J. Noga
,
R. Reischuk
Algorithmica
2011
Corpus ID: 2618113
We introduce the novel concept of knowledge states. The knowledge state approach can be used to construct competitive randomized…
Expand
2011
2011
Secure message transmission in asynchronous networks
Ashish Choudhury
,
A. Patra
,
Ashwinkumar Badanidiyuru
,
K. Srinathan
,
C. Rangan
J. Parallel Distributed Comput.
2011
Corpus ID: 37976445
2011
2011
Two-player interaction in quantum computing : cryptographic primitives & query complexity. (Interaction à deux joueurs en informatique quantique : primitives cryptographiques et complexité en requ…
Loïck Magnin
2011
Corpus ID: 11241199
Cette these etudie deux aspects d'interaction entre deux joueurs dans le modele du calcul et de la communication quantique…
Expand
2010
2010
Minimum generation error training with weighted Euclidean distance on LSP for HMM-based speech synthesis
Ming Lei
,
Zhenhua Ling
,
Lirong Dai
IEEE International Conference on Acoustics…
2010
Corpus ID: 16191504
This paper presents a minimum generation error (MGE) training method using weighted Euclidean distance measure on line spectral…
Expand
1998
1998
Searching on m Bounded Rays Optimally
S. Schuierer
1998
Corpus ID: 117333494
We consider the problem of searching on $m$ current rays for a target of unknown location. It is well-known that the optimal…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE