메뉴 건너뛰기




Volumn 4052 LNCS, Issue , 2006, Pages 119-131

Quantifying information leakage in process calculi

Author keywords

Information leakage; Information theory; Process calculi; Secrecy

Indexed keywords

COMPUTATION THEORY; MATHEMATICAL MODELS; SECURITY SYSTEMS;

EID: 33746371722     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11787006_11     Document Type: Conference Paper
Times cited : (22)

References (17)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The Spi-calculus
    • M. Abadi and A. Gordon. A calculus for cryptographic protocols: The Spi-calculus. Information and Computation, 148(1): 1-70, 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.2
  • 2
    • 0000036723 scopus 로고
    • Testing equivalence for mobile processes
    • M. Boreale and R. De Nicola. Testing equivalence for mobile processes. Information and Computation, 120(2): 279-303, 1995.
    • (1995) Information and Computation , vol.120 , Issue.2 , pp. 279-303
    • Boreale, M.1    De Nicola, R.2
  • 3
    • 0002953320 scopus 로고    scopus 로고
    • A symbolic semantics for the pi-calculus
    • M. Boreale and R. De Nicola. A symbolic semantics for the pi-calculus. Information and Computation, 126(1): 34-52, 1996.
    • (1996) Information and Computation , vol.126 , Issue.1 , pp. 34-52
    • Boreale, M.1    De Nicola, R.2
  • 8
    • 0035504977 scopus 로고    scopus 로고
    • Inequalities between entropy and index of coincidence derived from information diagrams
    • P. Harremoës and F. Topsøe. Inequalities between entropy and index of coincidence derived from information diagrams. IEEE Transactions on Information Theory, 47(7): 2944-2960, 2001.
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.7 , pp. 2944-2960
    • Harremoës, P.1    Topsøe, F.2
  • 9
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
    • P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. CRYPTO1996: 104-113, 1996.
    • (1996) CRYPTO1996 , pp. 104-113
    • Kocher, P.1
  • 10
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • P. Kocher, J. Jaffe and B. Jun. Differential Power Analysis. CRYPTO 1999: 388-397, 1999.
    • (1999) CRYPTO 1999 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 11
    • 3042651614 scopus 로고    scopus 로고
    • Defining information flow quantity
    • G. Lowe. Defining information flow quantity. Journal of Computer Security, 12(3-4): 619-653, 2004).
    • (2004) Journal of Computer Security , vol.12 , Issue.3-4 , pp. 619-653
    • Lowe, G.1
  • 15
    • 3242812760 scopus 로고    scopus 로고
    • Basic concepts, identities and inequalities - The toolkit of information theory
    • F. Topsøe. Basic concepts, identities and inequalities - the Toolkit of Information Theory. Entropy, 3:162-190, 2001. Also available at http://www.math.ku.dk/~topsoe/toolkitfinal.pdf.
    • (2001) Entropy , vol.3 , pp. 162-190
    • Topsøe, F.1
  • 16
    • 0033705210 scopus 로고    scopus 로고
    • Verifying secrets and relative secrecy
    • D. Volpano and G. Smith. Verifying Secrets and Relative Secrecy. In POPL 2000, 268-276, 2000.
    • (2000) POPL 2000 , pp. 268-276
    • Volpano, D.1    Smith, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.