-
1
-
-
27244455746
-
Probabilistic anonymity
-
M. Abadi and L. de Alfaro, editors, Proceedings of CONCUR, of, Springer, Available at
-
M. Bhargava and C. Palamidessi. Probabilistic anonymity. In M. Abadi and L. de Alfaro, editors, Proceedings of CONCUR, volume 3653 of Lecture Notes in Computer Science, pages 171-185. Springer, 2005. Available at http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/concur.pdf.
-
(2005)
Lecture Notes in Computer Science
, vol.3653
, pp. 171-185
-
-
Bhargava, M.1
Palamidessi, C.2
-
2
-
-
33750488738
-
Probable innocence revisited
-
Available at
-
K. Chatzikokolakis and C. Palamidessi. Probable innocence revisited. Theoretical Computer Science, 367(1-2):123-138, 2006. Available at http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/tcsPI.pdf.
-
(2006)
Theoretical Computer Science
, vol.367
, Issue.1-2
, pp. 123-138
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
-
3
-
-
35048848903
-
Anonymity protocols as noisy channels
-
Postproceedings of the Symp. on Trustworthy Global Computing, Springer, To appear. Available at
-
K. Chatzikokolakis, C. Palamidessi, and P. Panangaden. Anonymity protocols as noisy channels. In Postproceedings of the Symp. on Trustworthy Global Computing, Lecture Notes in Computer Science. Springer, 2006. To appear. Available at http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/ Channels/full.pdf.
-
(2006)
Lecture Notes in Computer Science
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
4
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
D. Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, 1:65-75, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 65-75
-
-
Chaum, D.1
-
5
-
-
0345275464
-
-
D. Clark, S. Hunt, and P. Malacaria. Quantitative analysis of the leakage of confidential data. In Proc. of QAPL 2001, 59 (3) of Electr. Notes Theor. Comput. Sci, pages 238-251. Elsevier Science B.V., 2001.
-
D. Clark, S. Hunt, and P. Malacaria. Quantitative analysis of the leakage of confidential data. In Proc. of QAPL 2001, volume 59 (3) of Electr. Notes Theor. Comput. Sci, pages 238-251. Elsevier Science B.V., 2001.
-
-
-
-
6
-
-
11344288540
-
-
D. Clark, S. Hunt, and P. Malacaria. Quantified interference for a while language. In Proc. of QAPL 2004, 112 of Electr. Notes Theor. Comput. Sci, pages 149-166. Elsevier Science B.V., 2005.
-
D. Clark, S. Hunt, and P. Malacaria. Quantified interference for a while language. In Proc. of QAPL 2004, volume 112 of Electr. Notes Theor. Comput. Sci, pages 149-166. Elsevier Science B.V., 2005.
-
-
-
-
7
-
-
33744479345
-
Freenet: A distributed anonymous information storage and retrieval system
-
Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, of, Springer
-
I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of Lecture Notes in Computer Science, pages 44-66. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.2009
, pp. 44-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.W.4
-
9
-
-
35048819403
-
Measuring anonymity with relative entropy
-
Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust FAST, Springer, To appear
-
Y. Deng, J. Pang, and P. Wu. Measuring anonymity with relative entropy. In Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust (FAST), Lecture Notes in Computer Science. Springer, 2006. To appear.
-
(2006)
Lecture Notes in Computer Science
-
-
Deng, Y.1
Pang, J.2
Wu, P.3
-
10
-
-
84957800033
-
Towards measuring anonymity
-
R. Dingledine and P. F. Syverson, editors, Proceedings of the workshop on Privacy Enhancing Technologies (PET) 2002, of, Springer
-
C. Díaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In R. Dingledine and P. F. Syverson, editors, Proceedings of the workshop on Privacy Enhancing Technologies (PET) 2002, volume 2482 of Lecture Notes in Computer Science, pages 54-68. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2482
, pp. 54-68
-
-
Díaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
11
-
-
0026157130
-
Toward a mathematical foundation for information flow security
-
Washington, Brussels, Tokyo, May, IEEE
-
J. W. Gray, III. Toward a mathematical foundation for information flow security. In Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy (SSP '91), pages 21-35, Washington - Brussels - Tokyo, May 1991. IEEE.
-
(1991)
Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy (SSP '91)
, pp. 21-35
-
-
Gray III, J.W.1
-
12
-
-
24144492346
-
Anonymity and information hiding in multiagent systems
-
J. Y. Halpern and K. R. O'Neill. Anonymity and information hiding in multiagent systems. Journal of Computer Security, 13(3):483-512, 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.3
, pp. 483-512
-
-
Halpern, J.Y.1
O'Neill, K.R.2
-
13
-
-
84915005479
-
Probability of error, equivocation, and the chernoff bound
-
M. Hellman and J. Raviv. Probability of error, equivocation, and the chernoff bound. IEEE Trans. on Information Theory, IT-16:368-372, 1970.
-
(1970)
IEEE Trans. on Information Theory
, vol.IT-16
, pp. 368-372
-
-
Hellman, M.1
Raviv, J.2
-
14
-
-
84948775168
-
Quantifying information flow
-
IEEE Computer Society Press
-
G.Lowe. Quantifying information flow. In Proc. of CSFW 2002, pages 18-31. IEEE Computer Society Press, 2002.
-
(2002)
Proc. of CSFW 2002
, pp. 18-31
-
-
Lowe, G.1
-
15
-
-
0034228863
-
Authentication theory and hypothesis testing
-
U. M. Maurer. Authentication theory and hypothesis testing. LEEE Transactions on Information Theory, 46(4): 1350-1356, 2000.
-
(2000)
LEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1350-1356
-
-
Maurer, U.M.1
-
17
-
-
1642355346
-
Covert channels and anonymizing networks
-
S. Jajodia, P. Samarati, and P. F. Syverson, editors, ACM
-
I. S. Moskowitz, R. E. Newman, D. P. Crepeau, and A. R. Miller. Covert channels and anonymizing networks. In S. Jajodia, P. Samarati, and P. F. Syverson, editors, WPES, pages 79-88. ACM, 2003.
-
(2003)
WPES
, pp. 79-88
-
-
Moskowitz, I.S.1
Newman, R.E.2
Crepeau, D.P.3
Miller, A.R.4
-
19
-
-
0344875573
-
Approximate non-interference
-
A. D. Pierro, C. Hankin, and H. Wiklicky. Approximate non-interference. Journal of Computer Security, 12(1):3782, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 3782
-
-
Pierro, A.D.1
Hankin, C.2
Wiklicky, H.3
-
20
-
-
18544383932
-
Measuring the confinement of probabilistic systems
-
A. D. Pierrô, C. Hankin, and H. Wiklicky. Measuring the confinement of probabilistic systems. Theoretical Computer Science, 340(1 ):3-56, 2005.
-
(2005)
Theoretical Computer Science
, vol.340
, Issue.1
, pp. 3-56
-
-
Pierrô, A.D.1
Hankin, C.2
Wiklicky, H.3
-
22
-
-
0242718403
-
On the amount of missing information and the Neyman-Pearson lemma
-
Wiley, New York
-
A. Rényi. On the amount of missing information and the Neyman-Pearson lemma. In Festschriftf for J. Neyman, pages 281-288. Wiley, New York, 1966.
-
(1966)
Festschriftf for J. Neyman
, pp. 281-288
-
-
Rényi, A.1
-
23
-
-
62749202080
-
On an improvement over Rényi's equivocation bound, 2006
-
Presented at the, September, Available at
-
N. Santhi and A. Vardy. On an improvement over Rényi's equivocation bound, 2006. Presented at the 44-th Annual Allerton Conference on Communication, Control, and Computing, September 2006. Available at http://arxiv.org/abs/cs/0608087.
-
(2006)
44-th Annual Allerton Conference on Communication, Control, and Computing
-
-
Santhi, N.1
Vardy, A.2
-
24
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
R. Dingledine and P. F. Syverson, editors, Proceedings of the workshop on Privacy Enhancing Technologies (PET) 2002, of, Springer
-
A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In R. Dingledine and P. F. Syverson, editors, Proceedings of the workshop on Privacy Enhancing Technologies (PET) 2002, volume 2482 of Lecture Notes in Computer Science, pages 41-53. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2482
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
25
-
-
3042662497
-
Probabilistic model checking of an anonymity system
-
V. Shmatikov. Probabilistic model checking of an anonymity system. Journal of Computer Security, 12(3/4):355-377, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.3-4
, pp. 355-377
-
-
Shmatikov, V.1
-
26
-
-
0030676973
-
Anonymous connections and onion routing
-
Oakland, California
-
P. Syverson, D. Goldschlag, and M. Reed. Anonymous connections and onion routing. In IEEE Symposium on Security and Privacy, pages 44-54, Oakland, California, 1997.
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 44-54
-
-
Syverson, P.1
Goldschlag, D.2
Reed, M.3
|