Sciweavers

179 search results - page 3 / 36
» Adversarial Leakage in Games
Sort
View
IAT
2009
IEEE
13 years 3 months ago
Extending Algorithms for Mobile Robot Patrolling in the Presence of Adversaries to More Realistic Settings
Patrolling environments by means of autonomous mobile robots has received an increasing attention in the last few years. The interest of the agent community is mainly in the develo...
Nicola Basilico, Nicola Gatti, Thomas Rossi, Sofia...
CHES
2003
Springer
100views Cryptology» more  CHES 2003»
13 years 10 months ago
Multi-channel Attacks
We introduce multi-channel attacks, i.e., side-channel attacks which utilize multiple side-channels such as power and EM simultaneously. We propose an adversarial model which combi...
Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
14 years 3 days ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
ECAI
2004
Springer
13 years 11 months ago
Adversarial Constraint Satisfaction by Game-Tree Search
Many decision problems can be modelled as adversarial constraint satisfaction, which allows us to integrate methods from AI game playing. In particular, by using the idea of oppone...
Kenneth N. Brown, James Little, Páidí...
IFIPTCS
2010
13 years 3 months ago
A Game-Theoretic Approach to Routing under Adversarial Conditions
Abstract. We present a game-theoretic framework for modeling and solving routing problems in dynamically changing networks. The model covers the aspects of reactivity and non-termi...
James Gross, Frank G. Radmacher, Wolfgang Thomas