{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:07Z","timestamp":1750220707067,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3337722.3337744","type":"proceedings-article","created":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T12:32:59Z","timestamp":1567513979000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Wait a second"],"prefix":"10.1145","author":[{"given":"Markus","family":"Eger","sequence":"first","affiliation":[{"name":"Universidad de Costa Rica"}]},{"given":"Daniel","family":"Gruss","sequence":"additional","affiliation":[{"name":"Graz University of Technology"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Workshop on Multimedia Security at ACM Multimedia.","author":"Ahsan Kamran","year":"2002","unstructured":"Kamran Ahsan and Deepa Kundur . 2002 . Practical data hiding in TCP\/IP . In Workshop on Multimedia Security at ACM Multimedia. Kamran Ahsan and Deepa Kundur. 2002. Practical data hiding in TCP\/IP. In Workshop on Multimedia Security at ACM Multimedia."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866341"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866854"},{"key":"e_1_3_2_1_4_1","unstructured":"Antoine Bauza. 2010. Hanabi. https:\/\/boardgamegeek.com\/boardgame\/98778\/hanabi  Antoine Bauza. 2010. Hanabi. https:\/\/boardgamegeek.com\/boardgame\/98778\/hanabi"},{"key":"e_1_3_2_1_5_1","volume-title":"Detection of covert channel encoding in network packet delays. Rapport technique TR536, de lUniversit\u00e9 de Dartmouth 19","author":"Berk Vincent","year":"2005","unstructured":"Vincent Berk , Annarita Giani , George Cybenko , and N Hanover . 2005. Detection of covert channel encoding in network packet delays. Rapport technique TR536, de lUniversit\u00e9 de Dartmouth 19 ( 2005 ). Vincent Berk, Annarita Giani, George Cybenko, and N Hanover. 2005. Detection of covert channel encoding in network packet delays. Rapport technique TR536, de lUniversit\u00e9 de Dartmouth 19 (2005)."},{"volume-title":"Advances in Computer Games","author":"Bouzy Bruno","key":"e_1_3_2_1_6_1","unstructured":"Bruno Bouzy . 2017. Playing Hanabi Near-Optimally . In Advances in Computer Games . Springer , 51--62. Bruno Bouzy. 2017. Playing Hanabi Near-Optimally. In Advances in Computer Games. Springer, 51--62."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1137\/080743470"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030108"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1513601.1513604"},{"key":"e_1_3_2_1_10_1","volume-title":"Evolving Agents for the Hanabi 2018 CIG Competition. In 2018 IEEE Conference on Computational Intelligence and Games (CIG). IEEE, 1--8.","author":"Canaan Rodrigo","year":"2018","unstructured":"Rodrigo Canaan , Haotian Shen , Ruben Torrado , Julian Togelius , Andy Nealen , and Stefan Menzel . 2018 . Evolving Agents for the Hanabi 2018 CIG Competition. In 2018 IEEE Conference on Computational Intelligence and Games (CIG). IEEE, 1--8. Rodrigo Canaan, Haotian Shen, Ruben Torrado, Julian Togelius, Andy Nealen, and Stefan Menzel. 2018. Evolving Agents for the Hanabi 2018 CIG Competition. In 2018 IEEE Conference on Computational Intelligence and Games (CIG). IEEE, 1--8."},{"key":"e_1_3_2_1_11_1","volume-title":"What's new about cloud computing security","author":"Chen Yanpei","year":"2010","unstructured":"Yanpei Chen , Vern Paxson , and Randy H Katz . 2010. What's new about cloud computing security . University of California , Berkeley Report No. UCB\/EECS- 2010 -5 January 20, 2010 (2010), 2010--5. Yanpei Chen, Vern Paxson, and Randy H Katz. 2010. What's new about cloud computing security. University of California, Berkeley Report No. UCB\/EECS-2010-5 January 20, 2010 (2010), 2010--5."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660294"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.4169\/math.mag.88.5.323"},{"key":"e_1_3_2_1_14_1","unstructured":"Markus Eger and Chris Martens. 2017. A Browser-based Interface for the Exploration and Evaluation of Hanabi AIs. Tech Demo at Foundations of Digital Games. (2017).  Markus Eger and Chris Martens. 2017. A Browser-based Interface for the Exploration and Evaluation of Hanabi AIs. Tech Demo at Foundations of Digital Games. (2017)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2017.8080417"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs:20080038"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2342763.2342787"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0141-6"},{"key":"e_1_3_2_1_19_1","volume-title":"Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense V","author":"Giani Annarita","year":"2010","unstructured":"Annarita Giani , Vincent H Berk , and George V Cybenko . 2006. Data exfiltration and covert channels . In Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense V , Vol. 6201 . International Society for Optics and Photonics , 6 2010 3. Annarita Giani, Vincent H Berk, and George V Cybenko. 2006. Data exfiltration and covert channels. In Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense V, Vol. 6201. International Society for Optics and Photonics, 620103."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.26"},{"key":"e_1_3_2_1_21_1","volume-title":"Power-Hammer: Exfiltrating Data from Air-Gapped Computers through Power Lines. arXiv.1804.04014","author":"Guri Mordechai","year":"2018","unstructured":"Mordechai Guri , Boris Zadov , Dima Bykhovsky , and Yuval Elovici . 2018. Power-Hammer: Exfiltrating Data from Air-Gapped Computers through Power Lines. arXiv.1804.04014 ( 2018 ). Mordechai Guri, Boris Zadov, Dima Bykhovsky, and Yuval Elovici. 2018. Power-Hammer: Exfiltrating Data from Air-Gapped Computers through Power Lines. arXiv.1804.04014 (2018)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_8"},{"key":"e_1_3_2_1_23_1","volume-title":"Reducing timing channels with fuzzy time. Journal of computer security","author":"Wei-Ming Hu.","year":"1992","unstructured":"Wei-Ming Hu. 1992. Reducing timing channels with fuzzy time. Journal of computer security ( 1992 ). Wei-Ming Hu. 1992. Reducing timing channels with fuzzy time. Journal of computer security (1992)."},{"key":"e_1_3_2_1_24_1","volume-title":"International Conference on Smart Card Research and Advanced Applications. Springer.","author":"Hutter Michael","year":"2013","unstructured":"Michael Hutter and J\u00f6rn-Marc Schmidt . 2013 . The temperature side channel and heating fault attacks . In International Conference on Smart Card Research and Advanced Applications. Springer. Michael Hutter and J\u00f6rn-Marc Schmidt. 2013. The temperature side channel and heating fault attacks. In International Conference on Smart Card Research and Advanced Applications. Springer."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.21"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/5254.757631"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"volume-title":"Power analysis attacks: Revealing the secrets of smart cards","author":"Mangard Stefan","key":"e_1_3_2_1_28_1","unstructured":"Stefan Mangard , Elisabeth Oswald , and Thomas Popp . 2008. Power analysis attacks: Revealing the secrets of smart cards . Vol. 31 . Springer Science & Business Media . Stefan Mangard, Elisabeth Oswald, and Thomas Popp. 2008. Power analysis attacks: Revealing the secrets of smart cards. Vol. 31. Springer Science & Business Media."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23294"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766906"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/11558859_19"},{"key":"e_1_3_2_1_32_1","volume-title":"Workshops at the Twenty-Ninth AAAI Conference on Artificial Intelligence.","author":"Osawa Hirotaka","year":"2015","unstructured":"Hirotaka Osawa . 2015 . Solving Hanabi: Estimating Hands by Opponent's Actions in Cooperative Game with Incomplete Information . In Workshops at the Twenty-Ninth AAAI Conference on Artificial Intelligence. Hirotaka Osawa. 2015. Solving Hanabi: Estimating Hands by Opponent's Actions in Cooperative Game with Incomplete Information. In Workshops at the Twenty-Ninth AAAI Conference on Artificial Intelligence."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_35_1","volume-title":"Game Programming Workshop 2018","author":"Sato Eisuke","year":"2018","unstructured":"Eisuke Sato , Takuya Kato , and Hirotaka Osawa . 2018 . Development and evaluation of the game agent to add opponent thinking time as indicator of strategy in Cooperative game Hanabi . Game Programming Workshop 2018 (2018), 30--34. Eisuke Sato, Takuya Kato, and Hirotaka Osawa. 2018. Development and evaluation of the game agent to add opponent thinking time as indicator of strategy in Cooperative game Hanabi. Game Programming Workshop 2018 (2018), 30--34."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Michael Schwarz Cl\u00e9mentine Maurice Daniel Gruss and Stefan Mangard. 2017. Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript. In Financial Cryptography and Data Security.  Michael Schwarz Cl\u00e9mentine Maurice Daniel Gruss and Stefan Mangard. 2017. Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript. In Financial Cryptography and Data Security .","DOI":"10.1007\/978-3-319-70972-7_13"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_1"},{"key":"e_1_3_2_1_38_1","volume-title":"Spiel des Jahres Award","author":"des Jahres Spiel","year":"2013","unstructured":"Spiel des Jahres . 2013. Spiel des Jahres Award 2013 . http:\/\/www.spieldesjahres.de\/en\/hanabi Spiel des Jahres. 2013. Spiel des Jahres Award 2013. http:\/\/www.spieldesjahres.de\/en\/hanabi"},{"volume-title":"Benelux Conference on Artificial Intelligence. Springer, 93--105","author":"Mark","key":"e_1_3_2_1_39_1","unstructured":"Mark JH van den Bergh, Anne Hommelberg, Walter A Kosters, and Flora M Spieksma. 2016. Aspects of the cooperative card game Hanabi . In Benelux Conference on Artificial Intelligence. Springer, 93--105 . Mark JH van den Bergh, Anne Hommelberg, Walter A Kosters, and Flora M Spieksma. 2016. Aspects of the cooperative card game Hanabi. In Benelux Conference on Artificial Intelligence. Springer, 93--105."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046671"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808138.2808141"},{"key":"e_1_3_2_1_42_1","unstructured":"Joseph Walton-Rivers. 2018. Fireworks agent competition. http:\/\/hanabi.aiclash.com.  Joseph Walton-Rivers. 2018. Fireworks agent competition. http:\/\/hanabi.aiclash.com."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2017.7969465"},{"key":"e_1_3_2_1_44_1","unstructured":"Wolfgang Warsch. 2018. The Mind. http:\/\/www.nsv.de\/spielregeln\/TheMind_GB.pdf.  Wolfgang Warsch. 2018. The Mind. http:\/\/www.nsv.de\/spielregeln\/TheMind_GB.pdf."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/2699806.2699809"},{"key":"e_1_3_2_1_46_1","volume-title":"Liang Gu, and Bryan Ford.","author":"Wu Weiyi","year":"2015","unstructured":"Weiyi Wu , Ennan Zhai , Daniel Jackowitz , David Isaac Wolinsky , Liang Gu, and Bryan Ford. 2015 . Warding off timing attacks in Deterland . arXiv:1504.07070 (2015). Weiyi Wu, Ennan Zhai, Daniel Jackowitz, David Isaac Wolinsky, Liang Gu, and Bryan Ford. 2015. Warding off timing attacks in Deterland. arXiv:1504.07070 (2015)."},{"key":"e_1_3_2_1_47_1","volume-title":"USENIX Security Symposium.","author":"Wu Zhenyu","year":"2012","unstructured":"Zhenyu Wu , Zhang Xu , and Haining Wang . 2012 . Whispers in the Hyperspace: High-speed Covert Channel Attacks in the Cloud .. In USENIX Security Symposium. Zhenyu Wu, Zhang Xu, and Haining Wang. 2012. Whispers in the Hyperspace: High-speed Covert Channel Attacks in the Cloud.. In USENIX Security Symposium."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2304439"},{"key":"e_1_3_2_1_49_1","volume-title":"USENIX Security Symposium.","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner . 2014 . Flush+Reload: A High Resolution, Low Noise, L3 Cache Side-Channel Attack . In USENIX Security Symposium. Yuval Yarom and Katrina Falkner. 2014. Flush+Reload: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In USENIX Security Symposium."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.31"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978324"}],"event":{"name":"FDG '19: The Fourteenth International Conference on the Foundations of Digital Games","acronym":"FDG '19","location":"San Luis Obispo California USA"},"container-title":["Proceedings of the 14th International Conference on the Foundations of Digital Games"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3337722.3337744","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3337722.3337744","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:05Z","timestamp":1750199585000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3337722.3337744"}},"subtitle":["playing Hanabi without giving hints"],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":52,"alternative-id":["10.1145\/3337722.3337744","10.1145\/3337722"],"URL":"https:\/\/doi.org\/10.1145\/3337722.3337744","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}