Sciweavers

179 search results - page 1 / 36
» Adversarial Leakage in Games
Sort
View
ICS
2010
Tsinghua U.
14 years 1 months ago
Adversarial Leakage in Games
Noga Alon, Yuval Emek, Michal Feldman, Moshe Tenne...
IJISEC
2008
119views more  IJISEC 2008»
13 years 4 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
VLDB
2005
ACM
135views Database» more  VLDB 2005»
13 years 10 months ago
Distributed Privacy Preserving Information Sharing
In this paper, we address issues related to sharing information in a distributed system consisting of autonomous entities, each of which holds a private database. Semi-honest beha...
Nan Zhang 0004, Wei Zhao
IACR
2011
94views more  IACR 2011»
12 years 4 months ago
After-the-Fact Leakage in Public-Key Encryption
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but onl...
Shai Halevi, Huijia Lin
IJNSEC
2006
80views more  IJNSEC 2006»
13 years 4 months ago
Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices
Side channel analysis is a technique that enables the adversary to benefit from information leakages occurring due to the implementation of encryption algorithms on
Dimitrios L. Delivasilis, Sokratis K. Katsikas