메뉴 건너뛰기




Volumn , Issue , 2006, Pages 33-44

Secure information flow with random assignment and encryption

Author keywords

Encryption; IND CCA; IND CPA; Noninterference; Reductions; Secure information flow; Type systems

Indexed keywords

DATA FLOW ANALYSIS; INFORMATION THEORY; POLYNOMIAL APPROXIMATION; PROBABILISTIC LOGICS; PUBLIC KEY CRYPTOGRAPHY; RANDOM PROCESSES;

EID: 34547244658     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1180337.1180341     Document Type: Article
Times cited : (28)

References (25)
  • 3
    • 84957037045 scopus 로고    scopus 로고
    • Computational probabilistic noninterference
    • M. Backes and B. Pfitzmann. Computational probabilistic noninterference. In Proceeding 7th ESORICS, pages 1-23, 2002.
    • (2002) Proceeding 7th ESORICS , pp. 1-23
    • Backes, M.1    Pfitzmann, B.2
  • 8
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D. Denning and P. Denning. Certification of programs for secure information flow. Commun. ACM, 20(7):504-513, 1977.
    • (1977) Commun. ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.1    Denning, P.2
  • 13
    • 84945249768 scopus 로고    scopus 로고
    • Semantics and program analysis of computationally secure information flow
    • P. Laud. Semantics and program analysis of computationally secure information flow. In Proceedings 10th ESOP (European Symposium on Programming, pages 77-91, 2001.
    • (2001) Proceedings 10th ESOP (European Symposium on Programming , pp. 77-91
    • Laud, P.1
  • 16
    • 26844509701 scopus 로고    scopus 로고
    • A type system for computationally secure information flow
    • Proceedings of the 15th International Symposium on Fundamentals of Computational Theory, of, Lübeck, Germany
    • P. Laud and V. Vene. A type system for computationally secure information flow. In Proceedings of the 15th International Symposium on Fundamentals of Computational Theory, volume 3623 of Lecture Notes in Computer Science, pages 365-377, Lübeck, Germany, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3623 , pp. 365-377
    • Laud, P.1    Vene, V.2
  • 21
    • 0034835461 scopus 로고    scopus 로고
    • A new type system for secure information flow
    • Cape Breton, Nova Scotia, Canada, June
    • G. Smith. A new type system for secure information flow. In Proceedings 14th IEEE Computer Security Foundations Workshop, pages 115-125, Cape Breton, Nova Scotia, Canada, June 2001.
    • (2001) Proceedings 14th IEEE Computer Security Foundations Workshop , pp. 115-125
    • Smith, G.1
  • 22
    • 18544362925 scopus 로고    scopus 로고
    • Probabilistic noninterference through weak probabilistic bisimulation
    • Pacific Grove, California, June
    • G. Smith. Probabilistic noninterference through weak probabilistic bisimulation. In Proceedings 16th IEEE Computer Security Foundations Workshop, pages 3-13, Pacific Grove, California, June 2003.
    • (2003) Proceedings 16th IEEE Computer Security Foundations Workshop , pp. 3-13
    • Smith, G.1
  • 25
    • 84942255620 scopus 로고    scopus 로고
    • A computational analysis of the Needham-Schroeder-(Lowe) protocol
    • Pacific Grove, California, June
    • B. Warinschi. A computational analysis of the Needham-Schroeder-(Lowe) protocol. In Proceedings 16th IEEE Computer Security Foundations Workshop, pages 248-262, Pacific Grove, California, June 2003.
    • (2003) Proceedings 16th IEEE Computer Security Foundations Workshop , pp. 248-262
    • Warinschi, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.