.
[T.git] / torrents / 7a0fb69b973d992d4176ca97f7a8a2e10b4bb768.torrent
blob8a3aac0f77c93350c745fa12ac406e472051e0e0
1 d13:announce-listll36:http://p4p.arenabg.com:1337/announceel38:udp://47.ip-51-68-199.eu:6969/announceel30:udp://9.rarbg.me:2780/announceel30:udp://9.rarbg.to:2710/announceel30:udp://9.rarbg.to:2730/announceel30:udp://9.rarbg.to:2920/announceel33:udp://open.stealth.si:80/announceel41:udp://opentracker.i2p.rocks:6969/announceel43:udp://tracker.coppersurfer.tk:6969/announceel38:udp://tracker.cyberia.is:6969/announceel36:udp://tracker.dler.org:6969/announceel48:udp://tracker.internetwarriors.net:1337/announceel49:udp://tracker.leechers-paradise.org:6969/announceel46:udp://tracker.openbittorrent.com:6969/announceel33:udp://tracker.opentrackr.org:1337el42:udp://tracker.pirateparty.gr:6969/announceel40:udp://tracker.tiny-vps.com:6969/announceel41:udp://tracker.torrent.eu.org:451/announceee4:infod5:filesld6:lengthi2113188e4:pathl83:Tambe M. Security and Game Theory. Algorithms, Deployed Systems, Lessons...2011.pdfeee4:name79:Tambe M. Security and Game Theory. Algorithms, Deployed Systems, Lessons...201112:piece lengthi16384e6:pieces2580:\x10ÿU \fØ6­3¬eb3v\rïNP†lhØr;?…*xC¤PmF^cž\0ßÚƒãt(ä%*zˆ\x0e÷mšCÿéN¯~˜¿aH’%
2 C™Öv\x1f¿yCÛ\0+�™™\be¡âì`ÂnF{EeC\x13O‚\x1f{WÖ¸òÆZEßl�3›r\x16\e\x1fC[\x0eÂ{áb‡YÑþ�Œ¤ý˜ÊVµWW\x13ê\x139Âê]Ä8H|âX6\x03³g;zŠ\x16ÙÕ$Îþæ×?�‰\x180™XhÖl\x14Îåâj\x1e\x18©Ø\x179m|7‡éàªQ‹E€éêå–m\x1càpU÷^\x0f
3 ¡¾Óx§Ã\x14Ž³»ý\x05ÉXÞ̾\bQV`í³N®K×éèè·>di¤\x0fÐ¥0"$¦I\x13fhv\x1dÏ�­m-ˆ~^L.04º?Ÿ§³AxB£û\eœþÝC×oYÕ䨡\x1cb-„ã�#„@P\x10%As        \x19\aç\Öb¡{Ó\x0f\x1eöû\x10ú–.äðI,§5³(G¾'ø4UAhµ[~TP]=\x15å&ÚE%Ê'8W`-ÂãÎ";×ý'ŽAXThD\x15A\x1au&F^ÍÅU7¥õQ\x13€<×Pl¼\aß\e¨ÿˆL-4\fÏnJ.Î|£,»\x04Š=Ëù­XB#â_\vB�‘µ­ËI]Î_]™Â Íð=ü\rêÔU·J\x12NeAÍdq\eŠÞÇ,J�$A\x14«» ¤pŸh+\x7f\x0fì8m1iøoËÓ,ÌO¸@¨\x03oC\x03Ïê%\x19ÍR€
4 \0Ï|çÑþ£Ù%Cü?—\x03E\x02,Óí|éÞìÀ�F;
5 \x17?\a¼ ‰Ë)±{Æ\x178\b¢~a\x19½$B~*K4\x7fKº9\0AÄÀߦlgy¡¦ÈpÜõæ ›ÝzL?½·l¤¾|\x0f]|SüŽà½Ç¸dlRËPù�†Oúˆv”DVSÞ�'d\x11`:Oĺöͳ'\x13ðqÔÒÌ\x14ì»\x0fBq\x0f\x11¡\x01^6Pm\x1aJ?º:ÏÈï\x7fØ®6hX진»`n<\x03ûÂ.­¾~.ˆHâý>ÜC¹\x19\x03�*C«¦î\HI\f40În°Ð\vö\n¿µïÔÇÈØþâU€K\x1fßÆ\v4:�ø\x7f3\x03\x7fàìOe\bg©†Â�}\x1c\x13\x15Œ‘Í\r+�Ó&fõ÷ÍÙD]* HÛq­áÃ@·è%6yG "¢tR\x14    R»Õž¡fuï.ºÿ\x06ÚšL~Ó #KY¿\x06Á
6 ÔVb,Ù|EΠ‘\x1cTD\x0fϦ®m¹ãx\f3?§ä’%@\x129\x01Âï�÷N8h@]¾ \x14ÈU¦­“
7 ØÀ±"nÑ‚Øþ¼¢\x06X\x1eÞ-†ÅÃ,&°’¨�Z!ú\b´Ÿ\x1eŒÐ€óú ªº4\x1eLô&¡Ï
8 ˆ›\x11º\r½\aÐ+¢\x05\0\x14›�H\x1c=\x13'\x05(¦Ë|\x1caß»\b¡ŸáÂDR2\x04LçÁ¡\x06]Èž‘Ï\x17\x06’ù£*ajê¯]\x05\aRÂLJ.\x15âò"ú¹\x7f"Nây¦Y#I\x03QDëEÅÙÊz‡^BÎÜfê$ŹáµûmO—l‹âC\x0fÖž†„�)H\x10ƒ\x02\x0e\x04â\x13JŠíLëd\aŸ¡G¿Ùò\x1f\x17gcª\x17Üø†R«ÎS|åùÍã…­äcú逬‘ºW‚hÞIrT@¥Ol˜ã\x14°˜ñø¾cÜáÄ\x1c‡H½þÈ9¥O~–xokù"\x18gIhý™Jîˆ\0lkƒê#ú\x18éß\vÊ™R#.ëëšú ÍÞÊcÄf3q\x11ÙµÕ%DõÐIìÉ\v\x025“\x13,µ'l  Ìh\x01i3\x05R\e6 —ˆiÜáæß\x1f0™ÓxHêA
9 jÀç@<‹÷ -m\r\x19º�í-ŠËkõÙ\x1a¾º !-Lø¥‹ÀŒ\x1a±xItb5^\x02\x01R_ò#´\fãGÉ\¬ß�/‚g&¥rÁuÑø‹°ãÈMo‘8^ÐK: ¼³:•Ð›˜v9{ˆz°ß‹\x1aÆ­!�eúJ×îE\0—ù‡\bï\x1fW\x0eoømÞ†w†§ýH2ÐZ\x05з(.­Ùk×\x14sí˜iú‡*üLs:—çà\x17Ð\bÃ=ZëMyM…×X¥#\vœi\x7f’€?gâ¾ËÜÃZ§ ¡h•Dgs‘º¤“,,v\x18\b\x1a‚A@§ßÁ¢.ÐV\x10`€8}ÕN€R\x03Ñ$;©\x1f•ûÒå}«ÖÚ÷¶V\x01C­Á`Ò¦gÒÚ!pèD\x0fÁbR\x7fA\x13#¨æÛËLH§\x7f9�‚°Ç(í�q\ÌMH¢\x0f�•ivVûÐkJYeÂ3\x17Ð\x13\x13m\x15O`\æDÍá‹]\x10’1ÉTÕ+â1\v23m\x14Êg–xK[6Ž¯|j#eâ�ÓìÙ`.ÕÌ\v…¬±ŽViÝ��coú\x10½0Øå²c2�.4\x7f
10 &¡õwy\x0fEØ—Àâ¨ÏÈKñ\x10éüp° \x13`ceع¹²Øæ•n/kƒ•9Ö\vTÐI\bíNí'RE>t«@¶ê—\x7fÖŠäÈŠeR\x02ø+n0§âG¤»Uõ|J�a5Y”5ÆŠ\x18­þªÞhâåƒî(L‰ÝD!*&±A½ÈNn¨®B'«ëOT\x11ôË\x1ak*Â\x02Ø’\x1a#a\x7f‘’*Õ§ã;c¢»T\x04º²§ÎÀȳÎd”\x19\x05D«ïÚH�_tMÛ\x15ª!ª™…"}\x19\x05\x05�”4"·]Ž\x18}�=5l{º|i\0úþ«ò\x14\x10©Iä\x1aÈh\v\0÷÷\x17riíȧ\x04œpœ\x12<\vÕë0o      _T .×k¬ƒ4±ù/ï\r\x17F\x03nI/*·Üªk¬ã²-·â€»\f-YÙ“¬Ë”xÜc\x1f\x0eò\x1eÀ0ÔüºÈ°\x14ØeE�qÞ\x7fñÛ\x0f\x7f9Kk\x13·\x10|䫽 ãÒô—Á!û²·\x05âS©ÝÐ\rðj\x02¡t\v™$ÖY\x12F@r§†ì+
11 Æj¯èœMÜÉy¡$‹À¹_Æ“\aŽ‘¥m\0\f˜EÑ\x15Õ\x7fÞªÚ}Ëei3›ë8¿I\x18àCpç÷œzÚªaÙzz'/aÏ8]³$à‘òZM9 é�Ž\x15yÊMy§n"\0T?§ºã¡ë.�Þè\x18¡¿#aÿ1t‡÷´ç�J`!Ôµ³³q¤7Ï‘T�àèá Å´\x1dK¨“Aø\x02·Dù\fŒ@ôžŽú‹?;M\e|Ljw\x16Wº|Š·B¿wqCµ\x0fh¸yqPº™väª(\x01\x126\x10%�©ÆÆB\x1e�ç‡\x02FèRþ=@(ƒìøUF{ö}®ÑÜœì�t\x02\x02]miøÅLÒ±h¡mNÁLIõ®¦Ìæ_OÄ8Û0%�\x18åN/Åðâ\x06íóÚ÷F\r
12 KåacßÁšs\0,Q\fF³Æˆ~\x1cÊØmª\eì=!YÑxµdD:ò{Ø\x148e^Að      a\x05½öÃÊB¼âRP×^&9�        3{z¿EtûåF\\rÌã�ý4…\0\x18ªLÁÊX2r1\x17dß¹ëð3ÑR°€\rFc4r‰O•<_\x7fåXe\x0fЉ`â-�†²—YxE       \x13aýD\bŠ\x17\x06•DDZ\x10nGæ�\x1c6¦–;ÃTúŒ\x19*8 \x01d4©ž\a#ÃÐU7Ò2W¤NhY�Ö[õ\fõÍeK³ƒÑ²
13 9é�¥¥WúCIrS°:{r®,Æ6e\x18‘A‘M:O�`»ÅjÀê=kÒ\x1f\x03~\x1fÐéžëÀ¯Ç#\x05ÝC/C>RáÊ!M´�ÝòVÍ‹#oü\x17Kg×?Ú¯b_%8‰¬Óì¦íy@¡\f
14 +\a'ûãj\x10äu­FƒÑSA1y9�X%²\x02Œrð´    Ûô\x1c\x1c±üìNµÇP«ý\x18¦”#²8‰\f>þÞòd±ÄÝyž·ÍÆ\x02‰Ö\x18¥²”Æ0_µ×¦à ]ѳ¸®\x1fÒ\0„±#z±£\r?M�‚j‚j\x03H]¶›ˆDÆ\x13ôûÏóe11:magnet-infod12:display-name79:Tambe+M.+Security+and+Game+Theory.+Algorithms,+Deployed+Systems,+Lessons...20119:info_hash20:z\x0f¶›—=™-AvÊ—÷¨¢á\vK·hee