Sciweavers

978 search results - page 34 / 196
» Knowledge, Probability, and Adversaries
Sort
View
INFORMATICALT
2007
76views more  INFORMATICALT 2007»
14 years 9 months ago
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker
A modified version of the Bellare and Rogaway (1993) adversarial model is encoded using Asynchronous Product Automata (APA). A model checker tool, Simple Homomorphism Verificatio...
Kim-Kwang Raymond Choo
SYNTHESE
2008
85views more  SYNTHESE 2008»
14 years 9 months ago
Objective Bayesianism with predicate languages
Objective Bayesian probability is often defined over rather simple domains, e.g., finite event spaces or propositional languages. This paper investigates the extension of objectiv...
Jon Williamson
ICIP
2002
IEEE
15 years 11 months ago
Nonadditive Gaussian watermarking and its application to wavelet-based image watermarking
This paper extends our recent game-theoretic approach [1] to design and embed watermarks in Gaussian signals in the presence of an adversary. The detector solves a binary hypothes...
Pierre Moulin, Aleksandar Ivanovic
INDOCRYPT
2005
Springer
15 years 3 months ago
Completion Attacks and Weak Keys of Oleshchuk's Public Key Cryptosystem
This paper revisits a public key cryptosystem which is based on finite string-rewriting systems. We consider a new approach for cryptanalysis of such proposals—the so-called com...
Heiko Stamer
CORR
2008
Springer
98views Education» more  CORR 2008»
14 years 9 months ago
An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks
Abstract. Relay attacks are a major concern for RFID systems: during an authentication process an adversary transparently relays messages between a verifier and a remote legitimate...
Gildas Avoine, Aslan Tchamkerten