메뉴 건너뛰기




Volumn 72, Issue 2, 2007, Pages 173-190

Tempus fugit: How to plug it

Author keywords

Probabilistic processes; Program transformation; Security analysis; Timing leaks

Indexed keywords

ALGORITHMS; COMPUTER CRIME; PROBABILITY;

EID: 34250629239     PISSN: 15678326     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jlap.2007.02.007     Document Type: Article
Times cited : (6)

References (24)
  • 1
    • 18544383932 scopus 로고    scopus 로고
    • Measuring the confinement of probabilistic systems
    • Di Pierro A., Hankin C., and Wiklicky H. Measuring the confinement of probabilistic systems. Theor. Comput. Sci. 340 1 (2005) 3-56
    • (2005) Theor. Comput. Sci. , vol.340 , Issue.1 , pp. 3-56
    • Di Pierro, A.1    Hankin, C.2    Wiklicky, H.3
  • 3
    • 0006419926 scopus 로고
    • Reactive, generative and stratified models of probabilistic processes
    • van Glabbeek R., Smolka S., and Steffen B. Reactive, generative and stratified models of probabilistic processes. Inform. Comput. 121 (1995) 59-80
    • (1995) Inform. Comput. , vol.121 , pp. 59-80
    • van Glabbeek, R.1    Smolka, S.2    Steffen, B.3
  • 4
    • 84937444411 scopus 로고
    • Probabilistic simulations for probabilistic processes
    • Proceedings of CONCUR 94, Springer Verlag
    • Segala R., and Lynch N. Probabilistic simulations for probabilistic processes. Proceedings of CONCUR 94. Lecture Notes in Computer Science vol. 836 (1994), Springer Verlag 481-496
    • (1994) Lecture Notes in Computer Science , vol.836 , pp. 481-496
    • Segala, R.1    Lynch, N.2
  • 7
    • 35248857469 scopus 로고    scopus 로고
    • Quantitative relations and approximate process equivalences
    • Proceedings of CONCUR'03. Lugiez D. (Ed), Springer Verlag
    • Di Pierro A., Hankin C., and Wiklicky H. Quantitative relations and approximate process equivalences. In: Lugiez D. (Ed). Proceedings of CONCUR'03. Lecture Notes in Computer Science vol. 2761 (2003), Springer Verlag 508-522
    • (2003) Lecture Notes in Computer Science , vol.2761 , pp. 508-522
    • Di Pierro, A.1    Hankin, C.2    Wiklicky, H.3
  • 8
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Lampson B. A note on the confinement problem. Commun. ACM 16 10 (1973) 613-615
    • (1973) Commun. ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.1
  • 9
  • 11
    • 0035067847 scopus 로고    scopus 로고
    • Process algebra and non-interference
    • (special Issue on CSFW-12)
    • Ryan P., and Schneider S. Process algebra and non-interference. J. Comput. Security 9 1/2 (2001) 75-103 (special Issue on CSFW-12)
    • (2001) J. Comput. Security , vol.9 , Issue.1-2 , pp. 75-103
    • Ryan, P.1    Schneider, S.2
  • 12
    • 0026222347 scopus 로고
    • Bisimulation through probabilistic testing
    • Larsen K., and Skou A. Bisimulation through probabilistic testing. Inform. Comput. 94 (1991) 1-28
    • (1991) Inform. Comput. , vol.94 , pp. 1-28
    • Larsen, K.1    Skou, A.2
  • 15
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (Part I: Information Flow)
    • Foundations of Security Analysis and Design, Tutorial Lectures, Springer Verlag
    • Focardi R., and Gorrieri R. Classification of security properties (Part I: Information Flow). Foundations of Security Analysis and Design, Tutorial Lectures. Lecture Notes in Computer Science vol. 2171 (2001), Springer Verlag 331-396
    • (2001) Lecture Notes in Computer Science , vol.2171 , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 16
    • 0023566630 scopus 로고
    • Three partition refinement algorithms
    • Paige R., and Tarjan R. Three partition refinement algorithms. SIAM J. Comput. 16 6 (1987) 973-989
    • (1987) SIAM J. Comput. , vol.16 , Issue.6 , pp. 973-989
    • Paige, R.1    Tarjan, R.2
  • 17
    • 0003062448 scopus 로고
    • Cryptanalysis of Diffie-Hellman, RSA, DSS, and other cryptosystems using timing attacks
    • Advances in Cryptology, CRYPTO '95. Coppersmith D. (Ed), Springer-Verlag
    • Kocher P. Cryptanalysis of Diffie-Hellman, RSA, DSS, and other cryptosystems using timing attacks. In: Coppersmith D. (Ed). Advances in Cryptology, CRYPTO '95. Lecture Notes in Computer Science vol. 963 (1995), Springer-Verlag 171-183
    • (1995) Lecture Notes in Computer Science , vol.963 , pp. 171-183
    • Kocher, P.1
  • 18
    • 0034449227 scopus 로고    scopus 로고
    • Timing attacks on web privacy
    • ACM, Athens, Greece
    • Felten E.W., and Schneider M.A. Timing attacks on web privacy. Proceedings of CCS'00 (2000), ACM, Athens, Greece 25-32
    • (2000) Proceedings of CCS'00 , pp. 25-32
    • Felten, E.W.1    Schneider, M.A.2
  • 19
    • 34250654392 scopus 로고    scopus 로고
    • R.J. Corin, S. Etalle, P.H. Hartel, A. Mader, Timed analysis of security protocols, J. Comput. Security, in press.
  • 20
    • 84957795309 scopus 로고    scopus 로고
    • Private authentication
    • 2nd Int. Workshop on Privacy Enhancing Technologies. Dingledine R., and Syverson P.F. (Eds), Springer Verlag
    • Abadi M. Private authentication. In: Dingledine R., and Syverson P.F. (Eds). 2nd Int. Workshop on Privacy Enhancing Technologies. Lecture Notes in Computer Science vol. 2482 (2002), Springer Verlag 27-40
    • (2002) Lecture Notes in Computer Science , vol.2482 , pp. 27-40
    • Abadi, M.1
  • 22
    • 1442311382 scopus 로고    scopus 로고
    • A simple framework for real-time cryptographic protocol analysis with composition proof rules
    • Gorrieri R., and Martinelli F. A simple framework for real-time cryptographic protocol analysis with composition proof rules. Sci. Comput. Program. 50 (2004) 23-49
    • (2004) Sci. Comput. Program. , vol.50 , pp. 23-49
    • Gorrieri, R.1    Martinelli, F.2
  • 23
    • 17744377974 scopus 로고    scopus 로고
    • M. Buchholtz, S. Gilmore, J. Hillston, F. Nielson, Securing statically-verified communications protocols against timing attacks, in: 1st International Workshop on Practical Applications of Stochastic Modelling (PASM 2004), vol. 128, 2005, pp. 123-143.
  • 24
    • 0004287147 scopus 로고    scopus 로고
    • Bergstra J., Ponse A., and Smolka S. (Eds), Elsevier Science, Amsterdam
    • In: Bergstra J., Ponse A., and Smolka S. (Eds). Handbook of Process Algebra (2001), Elsevier Science, Amsterdam
    • (2001) Handbook of Process Algebra


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.