Sciweavers

1189 search results - page 67 / 238
» Information Concealing Games
Sort
View
ACNS
2003
Springer
130views Cryptology» more  ACNS 2003»
15 years 3 months ago
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
Key exposures, known or inconspicuous, are a real security threat. Recovery mechanisms from such exposures are required. For digital signatures such a recovery should ideally —an...
Gene Itkis, Peng Xie
CRV
2006
IEEE
128views Robotics» more  CRV 2006»
15 years 1 months ago
Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in Scanned Documents for Digital Image Encryption
Conventional image-oriented cryptographic techniques lack the flexibility needed for content-specific security features such as the concealment of confidential information within ...
Alexander Wong, William Bishop
ICASSP
2011
IEEE
14 years 1 months ago
The cost of JPEG compression anti-forensics
The statistical footprint left by JPEG compression can be a valuable source of information for the forensic analyst. Recently, it has been shown that a suitable anti-forensic meth...
Giuseppe Valenzise, Marco Tagliasacchi, Stefano Tu...
CHI
2010
ACM
15 years 4 months ago
Understanding and evaluating cooperative games
Cooperative design has been an integral part of many games. With the success of games like Left4Dead, many game designers and producers are currently exploring the addition of coo...
Magy Seif El-Nasr, Bardia Aghabeigi, David Milam, ...
SAGT
2009
Springer
136views Game Theory» more  SAGT 2009»
15 years 4 months ago
Non-clairvoyant Scheduling Games
In a scheduling game, each player owns a job and chooses a machine to execute it. While the social cost is the maximal load over all machines (makespan), the cost (disutility) of ...
Christoph Dürr, Nguyen Kim Thang