메뉴 건너뛰기




Volumn 4912 LNCS, Issue , 2008, Pages 383-400

Adversaries and information leaks

Author keywords

[No Author keywords available]

Indexed keywords

APPROXIMATION THEORY; CONFORMAL MAPPING; CRYPTOGRAPHY; DATA FLOW ANALYSIS; PROBABILITY;

EID: 41549117992     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-78663-4_25     Document Type: Conference Paper
Times cited : (12)

References (28)
  • 2
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Denning, D., Denning, P.: Certification of programs for secure information flow. Communications of the ACM 20(7), 504-513 (1977)
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.1    Denning, P.2
  • 7
    • 38349010576 scopus 로고    scopus 로고
    • Computationally sound typing for non-interference: The case of deterministic encryption
    • Arvind, V, Prasad, S, eds, FSTTCS 2007, Springer. Heidelberg
    • Courant, J., Ene, C., Lakhnech, Y.: Computationally sound typing for non-interference: The case of deterministic encryption. In: Arvind, V., Prasad, S. (eds.) FSTTCS 2007. LNCS, vol. 4855, pp. 364-375. Springer. Heidelberg (2007)
    • (2007) LNCS , vol.4855 , pp. 364-375
    • Courant, J.1    Ene, C.2    Lakhnech, Y.3
  • 8
    • 84945249768 scopus 로고    scopus 로고
    • Laud, P.: Semantics and program analysis of computationally secure information flow. In: Sands, D. (ed.) ESOP 2001. LNCS, 2028, pp. 77-91. Springer, Heidelberg (2001)
    • Laud, P.: Semantics and program analysis of computationally secure information flow. In: Sands, D. (ed.) ESOP 2001. LNCS, vol. 2028, pp. 77-91. Springer, Heidelberg (2001)
  • 9
    • 35248840989 scopus 로고    scopus 로고
    • Laud. P.: Handling encryption in an analysis for secure information flow. In: Degano, P. (ed.) ESOP 2003. LNCS, 2618, pp. 159-173. Springer, Heidelberg (2003)
    • Laud. P.: Handling encryption in an analysis for secure information flow. In: Degano, P. (ed.) ESOP 2003. LNCS, vol. 2618, pp. 159-173. Springer, Heidelberg (2003)
  • 10
    • 26844509701 scopus 로고    scopus 로고
    • Laud. P., Vene, V.: A type system for computationally secure information flow. In: Liśkiewicz, M., Reischuk, R. (eds.) FCT 2005. LNCS, 3623, pp. 365-377. Springer, Heidelberg (2005)
    • Laud. P., Vene, V.: A type system for computationally secure information flow. In: Liśkiewicz, M., Reischuk, R. (eds.) FCT 2005. LNCS, vol. 3623, pp. 365-377. Springer, Heidelberg (2005)
  • 12
    • 84865660260 scopus 로고    scopus 로고
    • On the computational soundness of cryptographically masked flows
    • San Francisco, California January
    • Laud, P.: On the computational soundness of cryptographically masked flows. In: Proceedings 35th Symposium on Principles of Programming Languages, San Francisco, California (January 2008)
    • (2008) Proceedings 35th Symposium on Principles of Programming Languages
    • Laud, P.1
  • 13
    • 34548790762 scopus 로고    scopus 로고
    • A cryptographic decentralized label model
    • Oakland, California, pp
    • Vaughan, J., Zdancewic, S.: A cryptographic decentralized label model. In: IEEE Symposium on Security and Privacy, Oakland, California, pp. 192-206 (2007)
    • (2007) IEEE Symposium on Security and Privacy , pp. 192-206
    • Vaughan, J.1    Zdancewic, S.2
  • 14
    • 84865659111 scopus 로고    scopus 로고
    • Cryptographically sound implementations for typed information-flow security
    • San Francisco, California January
    • Fournet, C., Rezk. T.: Cryptographically sound implementations for typed information-flow security. In: Proceedings 35th Symposium on Principles of Programming Languages. San Francisco, California (January 2008)
    • (2008) Proceedings 35th Symposium on Principles of Programming Languages
    • Fournet, C.1    Rezk, T.2
  • 23
    • 20844445346 scopus 로고    scopus 로고
    • Quantitative information flow, relations and polymorphic types
    • Clark, D., Hunt, S., Malacaria, P.: Quantitative information flow, relations and polymorphic types. Journal of Logic and Computation 18(2), 181-199 (2005)
    • (2005) Journal of Logic and Computation , vol.18 , Issue.2 , pp. 181-199
    • Clark, D.1    Hunt, S.2    Malacaria, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.