-
1
-
-
84949756689
-
CSP and anonymity
-
S. Schneider A. Sidiropoulos CSP and anonymity Proceeding of the European Symposium on Research in Computer Security (ESORICS) Lecture Notes in Computer Science vol. 1146 1996 Springer 198 218
-
(1996)
, pp. 198-218
-
-
Schneider, S.1
Sidiropoulos, A.2
-
2
-
-
0003777431
-
Modelling and Analysis of Security Protocols
-
P.Y. Ryan S. Schneider Modelling and Analysis of Security Protocols 2001 Addison-Wesley
-
(2001)
-
-
Ryan, P.Y.1
Schneider, S.2
-
3
-
-
85120276756
-
-
P.F. Syverson, S.G. Stubblebine, Group principals and the formalization of anonymity, in: World Congress on Formal Methods (1), 1999, pp. 814–833.
-
-
-
-
4
-
-
24144492346
-
Anonymity and information hiding in multiagent systems
-
J.Y. Halpern K.R. O’Neill Anonymity and information hiding in multiagent systems Journal of Computer Security 13 3 2005 483 512
-
(2005)
Journal of Computer Security
, vol.13
, Issue.3
, pp. 483-512
-
-
Halpern, J.Y.1
O’Neill, K.R.2
-
5
-
-
0344875575
-
Information hiding anonymity and privacy: a modular approach
-
D. Hughes V. Shmatikov Information hiding anonymity and privacy: a modular approach Journal of Computer Security 12 1 2004 3 36
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 3-36
-
-
Hughes, D.1
Shmatikov, V.2
-
8
-
-
0023861309
-
The dining cryptographers problem: unconditional sender and recipient untraceability
-
D. Chaum The dining cryptographers problem: unconditional sender and recipient untraceability Journal of Cryptology 1 1988 65 75
-
(1988)
Journal of Cryptology
, vol.1
, pp. 65-75
-
-
Chaum, D.1
-
9
-
-
27244455746
-
Probabilistic anonymity
-
M. Bhargava C. Palamidessi Probabilistic anonymity M. Abadi L. de Alfaro Proceedings of CONCUR Lecture Notes in Computer Science vol. 3653 2005 Springer 171 185
-
(2005)
, pp. 171-185
-
-
Bhargava, M.1
Palamidessi, C.2
-
12
-
-
2642543760
-
Towards an information theoretic metric for anonymity
-
A. Serjantov G. Danezis Towards an information theoretic metric for anonymity Proceedings of the Workshop on Privacy Enhancing Technologies (PET) 2002 R. Dingledine P.F. Syverson Lecture Notes in Computer Science vol. 2482 2002 Springer 41 53
-
(2002)
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
13
-
-
3242815149
-
Towards measuring anonymity
-
C. Díaz S. Seys J. Claessens B. Preneel Towards measuring anonymity Proceedings of the Workshop on Privacy Enhancing Technologies (PET) 2002 R. Dingledine P.F. Syverson Lecture Notes in Computer Science Vol. 2482 2002 Springer 54 68
-
(2002)
, pp. 54-68
-
-
Díaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
14
-
-
85120273067
-
-
I.S. Moskowitz, R.E. Newman, D.P. Crepeau, A.R. Miller, Covert channels and anonymizing networks, in: S. Jajodia, P. Samarati, P.F. Syverson (Eds.), WPES, ACM, 2003, pp. 79–88.
-
-
-
-
15
-
-
85120263812
-
-
I.S. Moskowitz, R.E. Newman, P.F. Syverson, Quasi-anonymous channels, in: IASTED CNIS, 2003, pp. 126–131.
-
-
-
-
16
-
-
85120281017
-
-
Y. Zhu, R. Bettati, Anonymity vs. information leakage in anonymity systems, in: Proc. of ICDCS, IEEE Computer Society, 2005, pp. 514–524.
-
-
-
-
17
-
-
85120278650
-
-
M.R. Clarkson, A.C. Myers, F.B. Schneider, Belief in information flow, in: Proceedings of the 18th IEEE Computer Security Foundations Workshop (CSFW’05), IEEE, 2005, pp. 31–45.
-
-
-
-
18
-
-
35048819403
-
Measuring anonymity with relative entropy
-
Y. Deng J. Pang P. Wu Measuring anonymity with relative entropy T. Dimitrakos F. Martinelli P.Y.A. Ryan S.A. Schneider Proceeddings of the of the 4th International Workshop on Formal Aspects in Security and Trust Lecture Notes in Computer Science Vol. 4691 2006 Springer 65 79
-
(2006)
, pp. 65-79
-
-
Deng, Y.1
Pang, J.2
Wu, P.3
-
19
-
-
85120245775
-
-
J. McLean, Security models and information flow, in: IEEE Symposium on Security and Privacy, 1990, pp. 180–189.
-
-
-
-
20
-
-
85120270178
-
-
J.W. Gray, III, Toward a mathematical foundation for information flow security, in: Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy (SSP ’91), IEEE, Washington– Brussels–Tokyo, 1991, pp. 21–35.
-
-
-
-
21
-
-
85120273240
-
-
D. Clark, S. Hunt, P. Malacaria, Quantitative analysis of the leakage of confidential data, in: Proc. of QAPL 2001, Electr. Notes Theor. Comput. Sci., vol. 59 (3), Elsevier Science B.V., 2001, pp. 238–251.
-
-
-
-
22
-
-
11344288540
-
Quantified interference for a while language
-
D. Clark S. Hunt P. Malacaria Quantified interference for a while language Proceeding of QAPL 2004 Electr. Notes Theor. Comput. Sci vol. 112 2005 Elsevier Science B.V. 149 166
-
(2005)
, pp. 149-166
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
23
-
-
84948775168
-
Quantifying information flow
-
G. Lowe Quantifying information flow Proceeding of CSFW 2002 2002 IEEE Computer Society Press 18 31
-
(2002)
, pp. 18-31
-
-
Lowe, G.1
-
24
-
-
0034228863
-
Authentication theory and hypothesis testing
-
U.M. Maurer Authentication theory and hypothesis testing IEEE Transactions on Information Theory 46 4 2000 1350 1356
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1350-1356
-
-
Maurer, U.M.1
-
27
-
-
0004188848
-
Elements of Information Theory
-
T.M. Cover J.A. Thomas Elements of Information Theory 1991 John Wiley & Sons, Inc.
-
(1991)
-
-
Cover, T.M.1
Thomas, J.A.2
-
28
-
-
0033700286
-
Probabilistic noninterference for multi-threaded programs
-
A. Sabelfeld D. Sands Probabilistic noninterference for multi-threaded programs Proc. of CSFW 2000 2000 IEEE Computer Society Press 200 214
-
(2000)
, pp. 200-214
-
-
Sabelfeld, A.1
Sands, D.2
-
29
-
-
85120282611
-
-
Y. Deng, C. Palamidessi, J. Pang, Weak probabilistic anonymity, in: Proceedings of the 3rd International Workshop on Security Issues in Concurrency (SecCo), Electronic Notes in Theoretical Computer Science, vol. 180 (1), Elsevier Science B.V., 2007, pp. 55–76.
-
-
-
-
30
-
-
85120282207
-
-
M.Z. Kwiatkowska, G. Norman, D. Parker, PRISM 2.0: A tool for probabilistic model checking, in: Proceedings of the First International Conference on Quantitative Evaluation of Systems (QEST) 2004, IEEE Computer Society, 2004, pp. 322–323.
-
-
-
-
31
-
-
85120262991
-
-
V. Shmatikov, Probabilistic analysis of anonymity, in: 15th IEEE Computer Security Foundations Workshop (CSFW), 2002, pp. 119–128.
-
-
-
-
32
-
-
85120248030
-
-
M. Wright, M. Adler, B. Levine, C. Shields, An analysis of the degradation of anonymous protocols, in: ISOC Network and Distributed System Security Symposium (NDSS), 2002.
-
-
-
-
33
-
-
85120285180
-
-
K. Chatzikokolakis, C. Palamidessi, P. Panangaden, Probability of error in information-hiding protocols, in: Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF20), IEEE Computer Society, 2007, pp. 341–354.
-
-
-
|