-
2
-
-
40149107259
-
Anonymity protocols as noisy channels
-
Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Anonymity protocols as noisy channels. Information and Computation 206, 378-401 (2008)
-
(2008)
Information and Computation
, vol.206
, pp. 378-401
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
4
-
-
28144453799
-
-
Sabelfeld, A., Sands, D.: Dimensions and principles of declassification. In: Proceedings 18th IEEE Computer Security Foundations Workshop (June 2005)
-
Sabelfeld, A., Sands, D.: Dimensions and principles of declassification. In: Proceedings 18th IEEE Computer Security Foundations Workshop (June 2005)
-
-
-
-
7
-
-
0345275464
-
Quantitative analysis of the leakage of confidential data
-
Clark, D., Hunt, S., Malacaria, P.: Quantitative analysis of the leakage of confidential data. Electronic Notes in Theoretical Computer Science 59(3) (2002)
-
(2002)
Electronic Notes in Theoretical Computer Science
, vol.59
, Issue.3
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
8
-
-
20844445346
-
Quantitative information flow, relations and polymorphic types
-
Clark, D., Hunt, S., Malacaria, P.: Quantitative information flow, relations and polymorphic types. Journal of Logic and Computation 18(2), 181-199 (2005)
-
(2005)
Journal of Logic and Computation
, vol.18
, Issue.2
, pp. 181-199
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
9
-
-
34249899908
-
A static analysis for quantifying information flow in a simple imperative language
-
Clark, D., Hunt, S., Malacaria, P.: A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security 15, 321-371 (2007)
-
(2007)
Journal of Computer Security
, vol.15
, pp. 321-371
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
11
-
-
57349116220
-
Lagrange multipliers and maximum information leakage in different observational models
-
Tucson, Arizona, USA, pp, June
-
Malacaria, P., Chen, H.: Lagrange multipliers and maximum information leakage in different observational models. In: Proc. PLAS 2008: ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, Tucson, Arizona, USA, pp. 135-146 (June 2008)
-
(2008)
Proc. PLAS 2008: ACM SIGPLAN Workshop on Programming Languages and Analysis for Security
, pp. 135-146
-
-
Malacaria, P.1
Chen, H.2
-
12
-
-
28144442041
-
Belief in information flow
-
Aix-en-Provence, France, pp, June
-
Clarkson, M., Myers, A., Schneider, F.: Belief in information flow. In: Proceedings 18th IEEE Computer Security Foundations Workshop, Aix-en-Provence, France, pp. 31-45 (June 2005)
-
(2005)
Proceedings 18th IEEE Computer Security Foundations Workshop
, pp. 31-45
-
-
Clarkson, M.1
Myers, A.2
Schneider, F.3
-
13
-
-
35048859323
-
Probability of error in informationhiding protocols
-
Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Probability of error in informationhiding protocols. In: Proceedings 20th IEEE Computer Security Foundations Symposium, pp. 341-354 (2007)
-
(2007)
Proceedings 20th IEEE Computer Security Foundations Symposium
, pp. 341-354
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
14
-
-
84948775168
-
Quantifying information flow
-
Nova Scotia, Canada, pp, June
-
Lowe, G.: Quantifying information flow. In: Proceedings 15th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, pp. 18-31 (June 2002)
-
(2002)
Proceedings 15th IEEE Computer Security Foundations Workshop, Cape Breton
, pp. 18-31
-
-
Lowe, G.1
-
15
-
-
84948746951
-
Approximate non-interference
-
Nova Scotia, Canada, pp, June
-
Di Pierro, A., Hankin, C.,Wiklicky, H.: Approximate non-interference. In: Proceedings 15th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, pp. 1-17 (June 2002)
-
(2002)
Proceedings 15th IEEE Computer Security Foundations Workshop, Cape Breton
, pp. 1-17
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
17
-
-
33845537887
-
Measuring anonymity revisited
-
Liimatainen, S, Virtanen, T, eds, Espoo, Finland, pp
-
Tóth, G., Hornák, Z., Vajda, F.:Measuring anonymity revisited. In: Liimatainen, S., Virtanen, T. (eds.) Proceedings of the Ninth Nordic Workshop on Secure IT Systems, Espoo, Finland, pp. 85-90 (2004)
-
(2004)
Proceedings of the Ninth Nordic Workshop on Secure IT Systems
, pp. 85-90
-
-
Tóth, G.1
Hornák, Z.2
Vajda, F.3
-
18
-
-
84885205648
-
Measuring relationship anonymity in mix networks
-
Alexandria, Virginia, pp
-
Shmatikov, V., Wang, M.H.: Measuring relationship anonymity in mix networks. In: WPES 2006: Proceedings of the 5th ACM workshop on Privacy in Electronic Society, Alexandria, Virginia, pp. 59-62 (2006)
-
(2006)
WPES 2006: Proceedings of the 5th ACM workshop on Privacy in Electronic Society
, pp. 59-62
-
-
Shmatikov, V.1
Wang, M.H.2
-
19
-
-
41549117992
-
-
Smith, G.: Adversaries and information leaks (Tutorial). In: Barthe, G., Fournet, C. (eds.) TGC 2007. LNCS, 4912, pp. 383-400. Springer, Heidelberg (2008)
-
Smith, G.: Adversaries and information leaks (Tutorial). In: Barthe, G., Fournet, C. (eds.) TGC 2007. LNCS, vol. 4912, pp. 383-400. Springer, Heidelberg (2008)
-
-
-
-
20
-
-
84856043672
-
A mathematical theory of communication
-
Shannon, C.E.: A mathematical theory of communication. Bell System Technical Journal 27, 379-423 (1948)
-
(1948)
Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
22
-
-
84889281816
-
-
2nd edn. John Wiley & Sons, Inc, Chichester
-
Cover, T.M., Thomas, J.A.: Elements of Information Theory, 2nd edn. John Wiley & Sons, Inc., Chichester (2006)
-
(2006)
Elements of Information Theory
-
-
Cover, T.M.1
Thomas, J.A.2
-
25
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal of Computing 38(1), 97-139 (2008)
-
(2008)
SIAM Journal of Computing
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
|