메뉴 건너뛰기




Volumn 5504 LNCS, Issue , 2009, Pages 288-302

On the foundations of quantitative information flow

Author keywords

[No Author keywords available]

Indexed keywords

BAYES RISK; INFORMATION FLOWS; MIN-ENTROPY; MUTUAL INFORMATIONS; NONINTERFERENCE PROPERTIES; QUANTITATIVE INFORMATION; QUANTITATIVE THEORY; SECRET INFORMATION; SECURE INFORMATION FLOW; SHANNON ENTROPY; SIDE-CHANNEL ANALYSIS;

EID: 68549087948     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-00596-1_21     Document Type: Conference Paper
Times cited : (485)

References (25)
  • 4
    • 28144453799 scopus 로고    scopus 로고
    • Sabelfeld, A., Sands, D.: Dimensions and principles of declassification. In: Proceedings 18th IEEE Computer Security Foundations Workshop (June 2005)
    • Sabelfeld, A., Sands, D.: Dimensions and principles of declassification. In: Proceedings 18th IEEE Computer Security Foundations Workshop (June 2005)
  • 8
    • 20844445346 scopus 로고    scopus 로고
    • Quantitative information flow, relations and polymorphic types
    • Clark, D., Hunt, S., Malacaria, P.: Quantitative information flow, relations and polymorphic types. Journal of Logic and Computation 18(2), 181-199 (2005)
    • (2005) Journal of Logic and Computation , vol.18 , Issue.2 , pp. 181-199
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 9
    • 34249899908 scopus 로고    scopus 로고
    • A static analysis for quantifying information flow in a simple imperative language
    • Clark, D., Hunt, S., Malacaria, P.: A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security 15, 321-371 (2007)
    • (2007) Journal of Computer Security , vol.15 , pp. 321-371
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 19
    • 41549117992 scopus 로고    scopus 로고
    • Smith, G.: Adversaries and information leaks (Tutorial). In: Barthe, G., Fournet, C. (eds.) TGC 2007. LNCS, 4912, pp. 383-400. Springer, Heidelberg (2008)
    • Smith, G.: Adversaries and information leaks (Tutorial). In: Barthe, G., Fournet, C. (eds.) TGC 2007. LNCS, vol. 4912, pp. 383-400. Springer, Heidelberg (2008)
  • 20
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • Shannon, C.E.: A mathematical theory of communication. Bell System Technical Journal 27, 379-423 (1948)
    • (1948) Bell System Technical Journal , vol.27 , pp. 379-423
    • Shannon, C.E.1
  • 25
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal of Computing 38(1), 97-139 (2008)
    • (2008) SIAM Journal of Computing , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.