Matches in SemOpenAlex for { <https://semopenalex.org/work/W2896512969> ?p ?o ?g. }
Showing items 1 to 69 of
69
with 100 items per page.
- W2896512969 endingPage "53" @default.
- W2896512969 startingPage "37" @default.
- W2896512969 abstract "In classical notions of privacy in computer security, users attempt to keep their data private. A user that is bribed, extorted or blackmailed (i.e., coerced) may not do so. To get a general model of coercion, we strengthen the Dolev-Yao adversary with the ability to coerce others, to the foul adversary. We show that, depending on the setting, subtly different abilities should be assigned to the adversary – whereas existing approaches are one-size-fits-all. The variations of the foul adversary are formalised and we provide a hierarchical relation in their strength. We further interpret the adversary models using several examples." @default.
- W2896512969 created "2018-10-26" @default.
- W2896512969 creator A5042509488 @default.
- W2896512969 creator A5091109656 @default.
- W2896512969 date "2018-01-01" @default.
- W2896512969 modified "2023-09-24" @default.
- W2896512969 title "The Foul Adversary: Formal Models" @default.
- W2896512969 cites W108015383 @default.
- W2896512969 cites W1479744988 @default.
- W2896512969 cites W1506601610 @default.
- W2896512969 cites W1541831891 @default.
- W2896512969 cites W1563685744 @default.
- W2896512969 cites W1571378841 @default.
- W2896512969 cites W1572493548 @default.
- W2896512969 cites W1586571813 @default.
- W2896512969 cites W1841796248 @default.
- W2896512969 cites W1851628136 @default.
- W2896512969 cites W2002789557 @default.
- W2896512969 cites W2003593381 @default.
- W2896512969 cites W2007216019 @default.
- W2896512969 cites W2029693536 @default.
- W2896512969 cites W2060349224 @default.
- W2896512969 cites W2112450338 @default.
- W2896512969 cites W2121170230 @default.
- W2896512969 cites W2127539322 @default.
- W2896512969 cites W2147584309 @default.
- W2896512969 cites W2157301192 @default.
- W2896512969 cites W2164222678 @default.
- W2896512969 cites W2530513758 @default.
- W2896512969 cites W3003983481 @default.
- W2896512969 cites W4241528036 @default.
- W2896512969 doi "https://doi.org/10.1007/978-3-030-02450-5_3" @default.
- W2896512969 hasPublicationYear "2018" @default.
- W2896512969 type Work @default.
- W2896512969 sameAs 2896512969 @default.
- W2896512969 citedByCount "1" @default.
- W2896512969 countsByYear W28965129692020 @default.
- W2896512969 crossrefType "book-chapter" @default.
- W2896512969 hasAuthorship W2896512969A5042509488 @default.
- W2896512969 hasAuthorship W2896512969A5091109656 @default.
- W2896512969 hasBestOaLocation W28965129692 @default.
- W2896512969 hasConcept C38652104 @default.
- W2896512969 hasConcept C41008148 @default.
- W2896512969 hasConcept C41065033 @default.
- W2896512969 hasConcept C80444323 @default.
- W2896512969 hasConceptScore W2896512969C38652104 @default.
- W2896512969 hasConceptScore W2896512969C41008148 @default.
- W2896512969 hasConceptScore W2896512969C41065033 @default.
- W2896512969 hasConceptScore W2896512969C80444323 @default.
- W2896512969 hasLocation W28965129691 @default.
- W2896512969 hasLocation W28965129692 @default.
- W2896512969 hasOpenAccess W2896512969 @default.
- W2896512969 hasPrimaryLocation W28965129691 @default.
- W2896512969 hasRelatedWork W1567638270 @default.
- W2896512969 hasRelatedWork W2079101048 @default.
- W2896512969 hasRelatedWork W2111145992 @default.
- W2896512969 hasRelatedWork W2212585693 @default.
- W2896512969 hasRelatedWork W294456633 @default.
- W2896512969 hasRelatedWork W3110049015 @default.
- W2896512969 hasRelatedWork W317122954 @default.
- W2896512969 hasRelatedWork W4221142798 @default.
- W2896512969 hasRelatedWork W4285163392 @default.
- W2896512969 hasRelatedWork W2181883319 @default.
- W2896512969 isParatext "false" @default.
- W2896512969 isRetracted "false" @default.
- W2896512969 magId "2896512969" @default.
- W2896512969 workType "book-chapter" @default.