×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [bounded adversary]
Education
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning at test time
218 views
Documents
Privacy-Preserving Datamining on Vertically Partitioned Databases Kobbi Nissim Microsoft, SVC Joint work with Cynthia Dwork
219 views
Documents
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack Yitao Duan Computer Science Division, University of
233 views
Documents
Jamming-Resistant MAC Protocol1 A Jamming-Resistant MAC Protocol for Single-Hop Wireless Networks Baruch Awerbuch (JHU) Andrea W. Richa (ASU) Christian
221 views
Documents
Routing in Wireless and Adversarial Networks
33 views
Documents
A Jamming-Resistant MAC Protocol for Single-Hop Wireless Networks
35 views
Documents
Leakage-Resilient Cryptography
39 views
Documents
Leakage-Resilient Cryptography
47 views