-
1
-
-
84944050367
-
Probabilistic Information Flow in a Process Algebra
-
Proc. of 12th Int. Conf. on Concurrency Theory (CONCUR'01)
-
A. Aldini. Probabilistic Information Flow in a Process Algebra. In Proc. of 12th Int. Conf. on Concurrency Theory (CONCUR'01), Springer LNCS 2154:152-168, 2001.
-
(2001)
Springer LNCS
, vol.2154
, pp. 152-168
-
-
Aldini, A.1
-
3
-
-
3042529082
-
A Process-algebraic Approach for the Analysis of Probabilistic Noninterference
-
to appear
-
A. Aldini, M. Bravetti, and R. Gorrieri. A Process-algebraic Approach for the Analysis of Probabilistic Noninterference. Journal of Computer Security, to appear.
-
Journal of Computer Security
-
-
Aldini, A.1
Bravetti, M.2
Gorrieri, R.3
-
4
-
-
84943242087
-
Security Analysis of a Probabilistic Nonrepudiation Protocol
-
Proc. of 2nd Joint Int. Workshop on Process Algebra and Performance Modelling, Probabilistic Methods in Verification (PAPM-ProbMiV'02)
-
A. Aldini and R. Gorrieri. Security Analysis of a Probabilistic Nonrepudiation Protocol. In Proc. of 2nd Joint Int. Workshop on Process Algebra and Performance Modelling, Probabilistic Methods in Verification (PAPM-ProbMiV'02), Springer LNCS 2399:17-36, 2002.
-
(2002)
Springer LNCS
, vol.2399
, pp. 17-36
-
-
Aldini, A.1
Gorrieri, R.2
-
6
-
-
58149326570
-
Axiomatizing Probabilistic Processes: ACP with Generative Probabilities
-
J.C.M. Baeten, J.A. Bergstra, and S.A. Smolka. Axiomatizing Probabilistic Processes: ACP with Generative Probabilities. Information and Computation 121:234-255, 1995.
-
(1995)
Information and Computation
, vol.121
, pp. 234-255
-
-
Baeten, J.C.M.1
Bergstra, J.A.2
Smolka, S.A.3
-
7
-
-
84947419887
-
Weak Bisimulation for Fully Probabilistic Processes
-
Proc. of 9th Int. Conf. on Computer Aided Verification (CAV'97)
-
C. Baier, and H. Hermanns. Weak Bisimulation for Fully Probabilistic Processes. In Proc. of 9th Int. Conf. on Computer Aided Verification (CAV'97), Springer LNCS 1254:119-130, 1997.
-
(1997)
Springer LNCS
, vol.1254
, pp. 119-130
-
-
Baier, C.1
Hermanns, H.2
-
8
-
-
0004287147
-
-
J.A. Bergstra, A. Ponse, and S.A. Smolka (Eds.) Elsevier Science Publishers B.V., Amsterdam
-
J.A. Bergstra, A. Ponse, and S.A. Smolka (Eds.) Handbook of Process Algebra, Elsevier Science Publishers B.V., Amsterdam, 2001.
-
(2001)
Handbook of Process Algebra
-
-
-
10
-
-
0001786535
-
A Formal Approach to the Integration of Performance Aspects in the Modeling and Analysis of Concurrent Systems
-
M. Bernardo, L. Donatiello, and R. Gorrieri. A Formal Approach to the Integration of Performance Aspects in the Modeling and Analysis of Concurrent Systems. Information and Computation 144(2):83-154, 1998.
-
(1998)
Information and Computation
, vol.144
, Issue.2
, pp. 83-154
-
-
Bernardo, M.1
Donatiello, L.2
Gorrieri, R.3
-
13
-
-
0037209771
-
Discrete Time Generative-reactive Probabilistic Processes with Different Advancing Speeds
-
M. Bravetti and A. Aldini. Discrete Time Generative-reactive Probabilistic Processes with Different Advancing Speeds. Theoretical Computer Science 290(1):355-406, 2003.
-
(2003)
Theoretical Computer Science
, vol.290
, Issue.1
, pp. 355-406
-
-
Bravetti, M.1
Aldini, A.2
-
14
-
-
19144372130
-
Compositional Asymmetric Cooperations for Process Algebras with Probabilities, Priorities, and Time
-
Proc. of 1st Workshop on Models for Time-Critical Systems (MTCS'00), State College (PA)
-
M. Bravetti and M. Bernardo. Compositional Asymmetric Cooperations for Process Algebras with Probabilities, Priorities, and Time. In Proc. of 1st Workshop on Models for Time-Critical Systems (MTCS'00), State College (PA), ENTCS 39(3), 2000.
-
(2000)
ENTCS
, vol.39
, Issue.3
-
-
Bravetti, M.1
Bernardo, M.2
-
15
-
-
84879525367
-
Towards Quantitative Verification of Probabilistic Systems
-
(extended abstract). In Proc. of 28th Int. Colloquium on Automata, Languages and Programming (ICALP'01)
-
F. van Breugel, and J. Worrell. Towards Quantitative Verification of Probabilistic Systems (extended abstract). In Proc. of 28th Int. Colloquium on Automata, Languages and Programming (ICALP'01), Springer LNCS 2076:421-432, 2001.
-
(2001)
Springer LNCS
, vol.2076
, pp. 421-432
-
-
Van Breugel, F.1
Worrell, J.2
-
16
-
-
0005372979
-
Lectures on Formal Methods and Performance Analysis
-
E. Brinksma, H. Hermanns, and J.-P. Katoen (Eds.)
-
E. Brinksma, H. Hermanns, and J.-P. Katoen (Eds.) Lectures on Formal Methods and Performance Analysis, Springer LNCS 2090, 2001.
-
(2001)
Springer LNCS
, vol.2090
-
-
-
17
-
-
0034500567
-
Random Oracles in Constantipole: Practical Asynchronous Byzantine Agreement Using Cryptography
-
(extended abstract). ACM Press
-
C. Cachin, K. Kursawe, and V. Shoup. Random Oracles in Constantipole: Practical Asynchronous Byzantine Agreement Using Cryptography (extended abstract). In Proc. of 19th Symposium on Principles of Distributed Computing, ACM Press, pp. 123-132, 2000.
-
(2000)
Proc. of 19th Symposium on Principles of Distributed Computing
, pp. 123-132
-
-
Cachin, C.1
Kursawe, K.2
Shoup, V.3
-
18
-
-
35048862565
-
Performance Evaluation of Complex Systems: Techniques and Tools
-
M.C. Calzarossa and S. Tucci (Eds.) Performance 2002 Tutorial Lectures
-
M.C. Calzarossa and S. Tucci (Eds.) Performance Evaluation of Complex Systems: Techniques and Tools, Performance 2002 Tutorial Lectures, Springer LNCS 2459, 2002.
-
(2002)
Springer LNCS
, vol.2459
-
-
-
19
-
-
0345275464
-
Quantitative Analysis of Leakage of Confidential Data
-
QAPL 2001 - First International Workshop on Quantitative Aspects of Programming Laguages, Elsevier
-
D. Clark, S. Hunt, and P. Malacaria. Quantitative Analysis of Leakage of Confidential Data. In QAPL 2001 - First International Workshop on Quantitative Aspects of Programming Laguages, volume 59 of Electronic Notes in Theoretical Computer Science, Elsevier, 2002.
-
(2002)
Electronic Notes in Theoretical Computer Science
, vol.59
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
20
-
-
0029403439
-
Nondeterminism and Infinite Computations in Constraint Programming
-
F.S. de Boer, A. Di Pierro, and C. Palamidessi. Nondeterminism and Infinite Computations in Constraint Programming. Theoretical Computer Science, 151(1):37-78, 1995.
-
(1995)
Theoretical Computer Science
, vol.151
, Issue.1
, pp. 37-78
-
-
De Boer, F.S.1
Di Pierro, A.2
Palamidessi, C.3
-
21
-
-
84888220414
-
Metrics for Labeled Markov Processes
-
Proc. of 10th Int. Conf. on Concurrency Theory (CONCUR'99)
-
J. Desharnais, V. Gupta, R. Jagadeesan, and P. Panangaden. Metrics for Labeled Markov Processes. In Proc. of 10th Int. Conf. on Concurrency Theory (CONCUR'99), Springer LNCS 1664:258-273, 1999.
-
(1999)
Springer LNCS
, vol.1664
, pp. 258-273
-
-
Desharnais, J.1
Gupta, V.2
Jagadeesan, R.3
Panangaden, P.4
-
22
-
-
0036052667
-
The Metric Analogue of Weak Bisimulation for Probabilistic Processes
-
IEEE CS Press
-
J. Desharnais, V. Gupta, R. Jagadeesan, and P. Panangaden. The Metric Analogue of Weak Bisimulation for Probabilistic Processes. In Proc. of 17th Symposium on Logic in Computer Science (LICS), IEEE CS Press, pp. 413-422, 2002.
-
(2002)
Proc. of 17th Symposium on Logic in Computer Science (LICS)
, pp. 413-422
-
-
Desharnais, J.1
Gupta, V.2
Jagadeesan, R.3
Panangaden, P.4
-
23
-
-
0012799565
-
Probabilistic Confinement in a Declarative Framework
-
Declarative Programming - Selected Papers from AGP 2000 - La Havana, Cuba, Elsevier
-
A. Di Pierro, C. Hankin, and H. Wiklicky. Probabilistic Confinement in a Declarative Framework. In Declarative Programming - Selected Papers from AGP 2000 - La Havana, Cuba, volume 48 of Electronic Notes in Theoretical Computer Science, Elsevier, 2001.
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.48
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
24
-
-
84958745858
-
Analysing Approximate Confinement under Uniform Attacks
-
Proc. of SAS 2002 - 9th Int. Symposium on Static Analysis
-
A. Di Pierro, C. Hankin, and H. Wiklicky. Analysing Approximate Confinement under Uniform Attacks. In Proc. of SAS 2002 - 9th Int. Symposium on Static Analysis, Springer LNCS 2477:310-326, 2002.
-
(2002)
Springer LNCS
, vol.2477
, pp. 310-326
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
25
-
-
84948746951
-
Approximate Non-interference
-
Cape Breton, Nova Scotia, Canada
-
A. Di Pierro, C. Hankin, and H. Wiklicky. Approximate Non-interference. In Proc. of 15th IEEE Computer Security Foundations Workshop, pages 3-17, Cape Breton, Nova Scotia, Canada, 2002.
-
(2002)
Proc. of 15th IEEE Computer Security Foundations Workshop
, pp. 3-17
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
26
-
-
35048864584
-
Measuring the Confinement of Concurrent Probabilistic Systems
-
(R. Gorrieri, Ed.), Warsaw, Poland
-
A. Di Pierro, C. Hankin, and H. Wiklicky. Measuring the Confinement of Concurrent Probabilistic Systems. In Proc. of WITS'03 - Workshop on Issues in the Theory of Security (R. Gorrieri, Ed.), Warsaw, Poland, 2003. http://www.dsi.unive.it/IFIPWG1_7/wits2003.html.
-
(2003)
Proc. of WITS'03 - Workshop on Issues in the Theory of Security
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
28
-
-
35248857469
-
Quantitative Relations and Approximate Process Equivalences
-
Proc. of 14th Int. Conf. on Concurrency Theory (CONCUR'03), Springer Verlag, To appear
-
A. Di Pierro, C. Hankin, and H. Wiklicky. Quantitative Relations and Approximate Process Equivalences. In Proc. of 14th Int. Conf. on Concurrency Theory (CONCUR'03), Lecture Notes in Computer Science, Springer Verlag, 2003. To appear.
-
(2003)
Lecture Notes in Computer Science
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
29
-
-
0031645080
-
An Operational Semantics for Probabilistic Concurrent Constraint Programming
-
P. Iyer, Y. Choo, and D. Schmidt, Eds., IEEE Computer Society Press
-
A. Di Pierro and H. Wiklicky. An Operational Semantics for Probabilistic Concurrent Constraint Programming. In Proc. of ICCL'98 - Int. Conf. on Computer Languages, P. Iyer, Y. Choo, and D. Schmidt, Eds., pp. 174-183, IEEE Computer Society Press, 1998.
-
(1998)
Proc. of ICCL'98 - Int. Conf. on Computer Languages
, pp. 174-183
-
-
Di Pierro, A.1
Wiklicky, H.2
-
30
-
-
84896771832
-
Probabilistic Concurrent Constraint Programming: Towards a Fully Abstract Model
-
Proc. of MFCS'98 - Mathematical Foundations of Computer Science, L. Brim, J. Gruska, and J. Zlatuska, Eds.
-
A. Di Pierro and H. Wiklicky. Probabilistic Concurrent Constraint Programming: Towards a Fully Abstract Model. In Proc. of MFCS'98 - Mathematical Foundations of Computer Science, L. Brim, J. Gruska, and J. Zlatuska, Eds., Springer LNCS 1450:446-455, 1998.
-
(1998)
Springer LNCS
, vol.1450
, pp. 446-455
-
-
Di Pierro, A.1
Wiklicky, H.2
-
31
-
-
84956972923
-
Quantitative Observables and Averages in Probabilistic Concurrent Constraint Programming
-
New Trends in Constraints Selected Papers of the 1999 ERCIM/Compulog Workshop on Constraints, K.R. Apt, T. Kakas, E. Monfroy, and F. Rossi, Eds.
-
A. Di Pierro and H. Wiklicky. Quantitative Observables and Averages in Probabilistic Concurrent Constraint Programming. In New Trends in Constraints Selected Papers of the 1999 ERCIM/Compulog Workshop on Constraints, K.R. Apt, T. Kakas, E. Monfroy, and F. Rossi, Eds., Springer LNCS 1865, 2000.
-
(2000)
Springer LNCS
, vol.1865
-
-
Di Pierro, A.1
Wiklicky, H.2
-
34
-
-
35048862075
-
Foundations of Security Analysis and Design - Tutorial Lectures
-
R. Focardi and R. Gorrieri (Eds.)
-
R. Focardi and R. Gorrieri (Eds.) Foundations of Security Analysis and Design - Tutorial Lectures, Springer LNCS 2171, 2001.
-
(2001)
Springer LNCS
, vol.2171
-
-
-
35
-
-
0006419926
-
Reactive, Generative and Stratified Models of Probabilistic Processes
-
R. J. van Glabbeek, S. A. Smolka, and B. Steffen. Reactive, Generative and Stratified Models of Probabilistic Processes. Information and Computation 121:59-80, 1995.
-
(1995)
Information and Computation
, vol.121
, pp. 59-80
-
-
Van Glabbeek, R.J.1
Smolka, S.A.2
Steffen, B.3
-
37
-
-
84974759639
-
Toward a Mathematical Foundation for Information Flow Security
-
J. W. Gray III. Toward a Mathematical Foundation for Information Flow Security. Journal of Computer Security 1:255-294, 1992.
-
(1992)
Journal of Computer Security
, vol.1
, pp. 255-294
-
-
Gray III, J.W.1
-
39
-
-
0010974144
-
-
American Mathematical Society, Providence, Rhode Island, second revised edition
-
C.M. Grinstead and J.L. Snell. Introduction to Probability. American Mathematical Society, Providence, Rhode Island, second revised edition, 1997.
-
(1997)
Introduction to Probability
-
-
Grinstead, C.M.1
Snell, J.L.2
-
42
-
-
35048819758
-
Stochastic Process Algebras: Integrating Qualitative and Quantitative Modelling
-
H. Hermanns, U. Herzog, J. Hillston, V. Mertsiotakis, and M. Rettelbach. Stochastic Process Algebras: Integrating Qualitative and Quantitative Modelling. In 7th Conf. on Formal Description Techniques (FORTE'94), pp. 449-451, 1994.
-
(1994)
7th Conf. on Formal Description Techniques (FORTE'94)
, pp. 449-451
-
-
Hermanns, H.1
Herzog, U.2
Hillston, J.3
Mertsiotakis, V.4
Rettelbach, M.5
-
45
-
-
0003062448
-
Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Cryptosystems Using Timing Attacks
-
Advances in Cryptology, CRYPTO'95: 15th Annual Int. Cryptology Conf., D. Coppersmith, Ed.
-
P.C. Kocher. Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Cryptosystems Using Timing Attacks. In Advances in Cryptology, CRYPTO'95: 15th Annual Int. Cryptology Conf., D. Coppersmith, Ed., Springer LNCS 963:171-183, 1995.
-
(1995)
Springer LNCS
, vol.963
, pp. 171-183
-
-
Kocher, P.C.1
-
46
-
-
0032218226
-
A Probabilistic Poly-time Framework for Protocol Analysis
-
ACM Press
-
P.D. Lincoln, J.C. Mitchell, M. Mitchell, and A. Scedrov. A Probabilistic Poly-time Framework for Protocol Analysis. In ACM Conf. on Computer and Communications Security, pp. 112-121, ACM Press, 1998.
-
(1998)
ACM Conf. on Computer and Communications Security
, pp. 112-121
-
-
Lincoln, P.D.1
Mitchell, J.C.2
Mitchell, M.3
Scedrov, A.4
-
50
-
-
0034829266
-
Non-interference: Who needs It?
-
IEEE CS Press
-
P.Y.A. Ryan, J. McLean, J. Millen, and V. Gligor. Non-interference: Who needs It? In Proc. of 14th Computer Security Foundations Workshop (CSFW'01), IEEE CS Press, pp. 237-238, 2001.
-
(2001)
Proc. of 14th Computer Security Foundations Workshop (CSFW'01)
, pp. 237-238
-
-
Ryan, P.Y.A.1
McLean, J.2
Millen, J.3
Gligor, V.4
-
51
-
-
84957869855
-
A Per Model of Secure Information Flow in Sequential Programs
-
Proc. of European Symp. on Programming (ESOP'99)
-
A. Sabelfeld and D. Sands. A Per Model of Secure Information Flow in Sequential Programs. In Proc. of European Symp. on Programming (ESOP'99), Springer LNCS 1576:40-58, 1999.
-
(1999)
Springer LNCS
, vol.1576
, pp. 40-58
-
-
Sabelfeld, A.1
Sands, D.2
-
58
-
-
18544362925
-
Probabilistic Noninterference through Weak Probabilistic Bisimulation
-
IEEE CS Press
-
C. Smith. Probabilistic Noninterference through Weak Probabilistic Bisimulation. In Proc. of 16th Computer Security Foundations Workshop (CSFW'03), IEEE CS Press, pp. 3-13, 2003.
-
(2003)
Proc. of 16th Computer Security Foundations Workshop (CSFW'03)
, pp. 3-13
-
-
Smith, C.1
|