-
1
-
-
33745547205
-
Towards privacy in public databases
-
To appear
-
CHAWLA, S., DWORK, C., MCSHERRY, F., SMITH, A., AND WEE, H. 2005. Towards privacy in public databases. Theory of Cryptography, To appear.
-
(2005)
Theory of Cryptography
-
-
CHAWLA, S.1
DWORK, C.2
MCSHERRY, F.3
SMITH, A.4
WEE, H.5
-
2
-
-
0032201622
-
Private information retrieval
-
CHOR, B., GOLDREICH, O., KUSHILEVITZ, E., AND SUDAN, M. 1998. Private information retrieval. J. ACM 45, 6, 965-982.
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 965-982
-
-
CHOR, B.1
GOLDREICH, O.2
KUSHILEVITZ, E.3
SUDAN, M.4
-
3
-
-
56349087322
-
-
CLARK, D., HUNT, S., AND MALACARIA, P. 2002. Quantitative analysis of the leakage of confidential data. Electronic Notes in Theoretical Computer Science 59, 3. In Proceedings of the Workshop on Quantitative Aspects of Programming Languages (QAPL'01).
-
CLARK, D., HUNT, S., AND MALACARIA, P. 2002. Quantitative analysis of the leakage of confidential data. Electronic Notes in Theoretical Computer Science 59, 3. In Proceedings of the Workshop on Quantitative Aspects of Programming Languages (QAPL'01).
-
-
-
-
6
-
-
0003297274
-
Alternative semantics for temporal logics
-
EMERSON, E. A. 1983. Alternative semantics for temporal logics. Theor. Comput. Sci., 26, 121-130.
-
(1983)
Theor. Comput. Sci
, vol.26
, pp. 121-130
-
-
EMERSON, E.A.1
-
9
-
-
0025465251
-
A logic for reasoning about probabilities
-
FAGIN, R., HALPERN, J. Y., AND MEGIDDO, N. 1990. A logic for reasoning about probabilities. Inf. Comput., 87, 1/2, 78-128.
-
(1990)
Inf. Comput
, vol.87
, Issue.1-2
, pp. 78-128
-
-
FAGIN, R.1
HALPERN, J.Y.2
MEGIDDO, N.3
-
10
-
-
0003730235
-
-
MIT Press, Cambridge, MA
-
FAGIN, R., HALPERN, J. Y., MOSES, Y., AND VARDI, M. Y. 1995. Reasoning about Knowledge (Revised 2003). MIT Press, Cambridge, MA.
-
(1995)
Reasoning about Knowledge (Revised 2003)
-
-
FAGIN, R.1
HALPERN, J.Y.2
MOSES, Y.3
VARDI, M.Y.4
-
11
-
-
84974776068
-
A classification of security properties for process algebra
-
FOCARDI, R. AND GORRIERI, R. 1994. A classification of security properties for process algebra. J. Comput. Sci., 3, 1, 5-33.
-
(1994)
J. Comput. Sci
, vol.3
, Issue.1
, pp. 5-33
-
-
FOCARDI, R.1
GORRIERI, R.2
-
12
-
-
84988393004
-
Classification of security properties (Part I: Information flow)
-
Springer
-
FOCARDI, R. AND GORRIERI, R. 2001. Classification of security properties (Part I: Information flow). In Foundations of Security Analysis and Design. Springer, 331-396.
-
(2001)
Foundations of Security Analysis and Design
, pp. 331-396
-
-
FOCARDI, R.1
GORRIERI, R.2
-
13
-
-
0001206510
-
Coarsening at random: Characterizations, conjectures and counter-examples
-
GILL, R. D., VAN DER LAAN, M., AND ROBINS, J. 1997. Coarsening at random: Characterizations, conjectures and counter-examples. In Proceedings of the 1st Seattle Conference on Biostatistics. 255-294.
-
(1997)
Proceedings of the 1st Seattle Conference on Biostatistics
, pp. 255-294
-
-
GILL, R.D.1
VAN DER LAAN, M.2
ROBINS, J.3
-
15
-
-
0032047481
-
A logical approach to multilevel security of probabilistic systems
-
GRAY, J. W. AND SYVERSON, P. F. 1998. A logical approach to multilevel security of probabilistic systems. Dist. Comput, 11, 2, 73-90.
-
(1998)
Dist. Comput
, vol.11
, Issue.2
, pp. 73-90
-
-
GRAY, J.W.1
SYVERSON, P.F.2
-
17
-
-
0036815905
-
Characterizing the common prior assumption
-
HALPERN, J. Y. 2002. Characterizing the common prior assumption. J. Econ. Theory, 106, 2, 316-355.
-
(2002)
J. Econ. Theory
, vol.106
, Issue.2
, pp. 316-355
-
-
HALPERN, J.Y.1
-
21
-
-
35248868917
-
Modeling adversaries in a logic for security protocol analysis
-
Proceedings of the Formal Aspects of Security FASec'02, Springer-Verlag, Berlin/Heidelberg/New York
-
HALPERN, J. Y. AND PUCELLA, R. 2003a. Modeling adversaries in a logic for security protocol analysis. In Proceedings of the Formal Aspects of Security (FASec'02). Lecture Notes in Computer Science, Volume 2629. Springer-Verlag, Berlin/Heidelberg/New York, 115-132.
-
(2003)
Lecture Notes in Computer Science
, vol.2629
, pp. 115-132
-
-
HALPERN, J.Y.1
PUCELLA, R.2
-
23
-
-
0027665952
-
Knowledge, probability, and adversaries
-
HALPERN, J. Y. AND TUTTLE, M. R. 1993. Knowledge, probability, and adversaries. J. ACM, 40, 4, 917-962.
-
(1993)
J. ACM
, vol.40
, Issue.4
, pp. 917-962
-
-
HALPERN, J.Y.1
TUTTLE, M.R.2
-
24
-
-
0043271203
-
Recent work in inductive logic
-
T. Machan and K. Lucey, Eds. Rowman & Allanheld, Totowa, NJ
-
KYBURG, H. 1983. Recent work in inductive logic. In Recent Work in Philosophy, T. Machan and K. Lucey, Eds. Rowman & Allanheld, Totowa, NJ. 87-150.
-
(1983)
Recent Work in Philosophy
, pp. 87-150
-
-
KYBURG, H.1
-
29
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
MCLEAN, J. 1994. A general theory of composition for trace sets closed under selective interleaving functions. In Proceedings of the IEEE Symposium on Security and Privacy (SP'94). 79-93.
-
(1994)
Proceedings of the IEEE Symposium on Security and Privacy (SP'94)
, pp. 79-93
-
-
MCLEAN, J.1
-
30
-
-
0346338341
-
-
MEYDEN, R. VAN DER 1998. Common knowledge and update in finite environments. Inf. Comput., 140, 2, 115-157.
-
MEYDEN, R. VAN DER 1998. Common knowledge and update in finite environments. Inf. Comput., 140, 2, 115-157.
-
-
-
-
31
-
-
33244491452
-
A probabilistic polynomial-time calculus for the analysis of cryptographic protocols
-
MITCHELL, J. C., RAMANATHAN, A., SCEDROV, A., AND TEAGUE, V. 2006. A probabilistic polynomial-time calculus for the analysis of cryptographic protocols. Theor. Comput. Sci. 353, 118-164.
-
(2006)
Theor. Comput. Sci
, vol.353
, pp. 118-164
-
-
MITCHELL, J.C.1
RAMANATHAN, A.2
SCEDROV, A.3
TEAGUE, V.4
-
32
-
-
84974067127
-
The common prior assumption in economic theory
-
MORRIS, S. 1995. The common prior assumption in economic theory. Econom. Philos., 11, 227-253.
-
(1995)
Econom. Philos
, vol.11
, pp. 227-253
-
-
MORRIS, S.1
-
35
-
-
0020166136
-
n-process mutual exclusion with bounded waiting by 4 · logr n-valued shared variable
-
RABIN, M. O. 1982. n-process mutual exclusion with bounded waiting by 4 · logr n-valued shared variable. J. Comp. Syst. Sci., 25, 1, 66-75.
-
(1982)
J. Comp. Syst. Sci
, vol.25
, Issue.1
, pp. 66-75
-
-
RABIN, M.O.1
-
37
-
-
0003777431
-
-
Addison-Wesley, Reading, MA
-
RYAN, P. Y. A., SCHNEIDER, S. A., GOLDSMITH, M. H., LOWE, G., AND ROSCOE, A. W. 2001. Modeling and Analysis of Security Protocols. Addison-Wesley, Reading, MA.
-
(2001)
Modeling and Analysis of Security Protocols
-
-
RYAN, P.Y.A.1
SCHNEIDER, S.A.2
GOLDSMITH, M.H.3
LOWE, G.4
ROSCOE, A.W.5
-
38
-
-
0037251378
-
Language-based information-flow security
-
SABELFELD, A. AND MYERS, A. C. 2003. Language-based information-flow security. IEEE J. Select. Areas Comm., 21, 1, 5-19.
-
(2003)
IEEE J. Select. Areas Comm
, vol.21
, Issue.1
, pp. 5-19
-
-
SABELFELD, A.1
MYERS, A.C.2
-
40
-
-
84890522850
-
Communication theory of secrecy systems
-
SHANNON, C. E. 1949. Communication theory of secrecy systems. Bell System Tech. J., 28-4, 656-715.
-
(1949)
Bell System Tech. J
, vol.28 -4
, pp. 656-715
-
-
SHANNON, C.E.1
|